About Grey Hat Developer
When we polled people of a certain demographic, we asked them why they were not taking advantage of free and open resources to educate themselves in the rapidly growing field of IT/Cyber-Security? The response we heard most was that the time needed to train until actually gaining employment is too long and too expensive.
Grey Hat Developer is an organization that provides Free IT/Cyber-security training to ex-felons, adult learners, minorities, and disadvantaged youth. Our mission is simple: To help as many people who feel that they are trapped but who possess the desire and willingness to change, be open to the idea that change can be fostered through learning IT/Cybrary security skills.
We Are An Organization That Trains, Certifies, and Employs.
We Help Clients Get Trained, Get Certified, and Get Working. Its Simple.
How We Got Started
At home in Texas, we noticed a trend. Initially, we noticed that there’s a lot of people with a blemished past who have reformed, rehabilitated, and out of either sheer drive to become their own bosses or being forced to start their own companies due to society not giving them the opportunity to advance themselves beyond positions that pay very low wages (or jobs that may pay high wages but are very labor intensive and require them to spend more time away from their families), these people have managed to start reasonably successful businesses for themselves. The constant variable that we noticed among this demographic was their failure to properly implement the use of IT/Information Systems. These entrepreneurs were lacking something that every business needs to remain competitive, evolve, and remain successful.
We also noticed there was a huge desire among not only convicted felons, but also among minorities (i.e., Blacks, Latinos, etc.) to learn and secure employment in the IT/Cyber-Security fields.
It didn’t take long to consider that this trend is not unique to the Southern state, but also applies to individuals in similar situations across the United States, if not globally. We set out with the vision to bridge the gap between these two demographics. We arm the second group with the knowledge and skills necessary to be employed by the first group. Everybody Wins!
Answers to Your Questions
What is Grey Hat Developer?
Grey Hat Developer is a company that offers managed IT services. We also offer IT and Cyber-Security training to those who request us to provide it.
Isn’t “Grey Hat” a hacker term?
Yes, that is correct. While we do embrace the spirit of such term in the sense that we believe that hacking isn’t good nor evil, that isn’t what Grey Hat Developer is about. We see IT and Cyber-Security skills as a viable path for someone to forge a very promising future for themselves. Unfortunately one mishap in someone’s past could derail that person from ever having a career as a White Hat Hacker. But that doesn’t mean that person should turn to the allure of becoming a Black Hat Hacker. So that’s where that grey area has become a part of our philosophy. We have witnessed Cyber-Security completely change a person’s life around. That fueled us with inspiration and Grey Hat Developer was born.
Will you teach my child to hack?
No. Your child already knows how to hack. 🙂
How do I sign up for training and what do I need?
Signing up is simple. Just contact us and let us know that you’re interested. One of our reps will guide you through the on-boarding process. In most cases, all you’ll need is a solid internet connection, a compatible device, the patience of Job, and the desire to learn.
Are your services expensive, there aren’t any rates listed on any of your products or services?
As mentioned, we understand that everyone’s budget and requirements are unique. At this time there are no “fixed” prices on any of our services. We aim to get a feel for your project as a whole before we throw any numbers in your face. Contact us for a quote on your next project or idea.
Blog / Latest News
Cross-Site Scripting (XSS)- Defacing, Phishing, and Session Hijacking – Part 2
Defacing, Phishing, and Session Hijacking- Part 221August, 2022Days 45 - 48 Cross-Site Scripting (XSS) - Defacing, Phishing, and Session Hijacking - Part 2 100 Days of HackingPhoto cred - roonz_nl In the previous post I covered defacing, phishing, and hijacking...
Cross-Site Scripting (XSS)- Defacing, Phishing, and Session Hijacking
Defacing, Phishing, and Session Hijacking16August, 2022Days 41 - 44 Cross-Site Scripting (XSS) - Defacing, Phishing, and Session Hijacking 100 Days of HackingPhoto cred- @markusspiske In this module we learned what the three types of XSS are as well as how to identify...
Javascript: Don’t Hate, Deobfuscate
Javascript: Don't Hate, Deobfuscate6August, 2022Days 38 - 40Javascript: Don't Hate, Deobfuscate100 Days of HackingPhoto creds goes ->> @felix_mittermeier It’s been my observance that if one’s a coder they either love Javascript or absolutely hate Javascript. If...
Fuzzing with Ffuf – Part 2
Attacking Web Apps: Fuzzing with Ffuf - Part 2 24 July, 2022 Days 36 - 37 Fuzzing with Ffuf- Part 2 100 Days of Hacking In this article we’ll continue using Ffuf to attack a web application. We are still grinding along HTB’s Bug Bounty Job Role Path, Attacking Web...
Attacking Web Apps: Fuzzing with Ffuf
Attacking Web Apps: Fuzzing with Ffuf10July, 2022Days 30 - 35Attacking Web Apps: Fuzzing with Ffuf100 Days of HackingThis post will cover Fuzzing a web application. Fuzzing is fundamental when testing web applications. Tons of info, clues, assets can be discovered...
Passive and Active Recon – Part 2
Passive & Active Recon - Part 227June, 2022Days 26 - 29Passive & Active Recon: Part 2100 Days of HackingThis post will be brief and will make up Part 2 of Passive and Active Recon. We are still grinding along HTB’s Bug Bounty Job Role Path, Information...
Passive and Active Recon
Passive & Active Recon21June, 2022Days 21 -25Passive & Active Recon100 Days of HackingThe next series of post are from the module Information Gathering - Web Edition, found within HTB's Bug Bounty Job Role Path. Specifically, this post will cover Passive and...
Looking into Web Proxies
Intercepting Web Requests Part 2:Web Proxies12June, 2022Days 12-20Web Proxies100 Days of HackingUltimately we'll be looking into Web Proxies as the main focus of this post. But first we'll look at Encoding/Decoding, Web & Zap Fuzzer, and Zap Scanner. To...
Intercepting Web Requests
Intercepting Web Requests31MAY, 2022Days 8 -11Intercepting Web Requests100 Days of HackingOne of the things that a good vulnerability researcher, pen tester, or bug hunter will need is a solid grasp of tools used in the craft. While tools are plentiful, most are...
WordPress Security Assessment
BB JOB ROLE PATH - HTBWordPress Security AssessmentQuintius, Day 7 , 100 Days of Hacking22 March 2016Day 7 of the journey served to tie everything learned in Day 6 together. Still navigating my way down the Bug Bunty Job Path role, it’s now time to tackle the...
Get In Contact With Us
Office
704 W. 15th Street
San Angelo, Tx. 76903
Hours
M-F: 8am - 10pm
Sat. 10am - 3pm
S: Closed
Call Us
(432)212-8959