About Grey Hat Developer
When we polled people of a certain demographic, we asked them why they were not taking advantage of free and open resources to educate themselves in the rapidly growing field of IT/Cyber-Security? The response we heard most was that the time needed to train until actually gaining employment is too long and too expensive.
Grey Hat Developer is an organization that provides Free IT/Cyber-security training to ex-felons, adult learners, minorities, and disadvantaged youth. Our mission is simple: To help as many people who feel that they are trapped but who possess the desire and willingness to change, be open to the idea that change can be fostered through learning IT/Cybrary security skills.
We Are An Organization That Trains, Certifies, and Employs.
We Help Clients Get Trained, Get Certified, and Get Working. Its Simple.
How We Got Started
At home in Texas, we noticed a trend. Initially, we noticed that there’s a lot of people with a blemished past who have reformed, rehabilitated, and out of either sheer drive to become their own bosses or being forced to start their own companies due to society not giving them the opportunity to advance themselves beyond positions that pay very low wages (or jobs that may pay high wages but are very labor intensive and require them to spend more time away from their families), these people have managed to start reasonably successful businesses for themselves. The constant variable that we noticed among this demographic was their failure to properly implement the use of IT/Information Systems. These entrepreneurs were lacking something that every business needs to remain competitive, evolve, and remain successful.
We also noticed there was a huge desire among not only convicted felons, but also among minorities (i.e., Blacks, Latinos, etc.) to learn and secure employment in the IT/Cyber-Security fields.
It didn’t take long to consider that this trend is not unique to the Southern state, but also applies to individuals in similar situations across the United States, if not globally. We set out with the vision to bridge the gap between these two demographics. We arm the second group with the knowledge and skills necessary to be employed by the first group. Everybody Wins!
Answers to Your Questions
What is Grey Hat Developer?
Grey Hat Developer is a company that offers managed IT services. We also offer IT and Cyber-Security training to those who request us to provide it.
Isn’t “Grey Hat” a hacker term?
Yes, that is correct. While we do embrace the spirit of such term in the sense that we believe that hacking isn’t good nor evil, that isn’t what Grey Hat Developer is about. We see IT and Cyber-Security skills as a viable path for someone to forge a very promising future for themselves. Unfortunately one mishap in someone’s past could derail that person from ever having a career as a White Hat Hacker. But that doesn’t mean that person should turn to the allure of becoming a Black Hat Hacker. So that’s where that grey area has become a part of our philosophy. We have witnessed Cyber-Security completely change a person’s life around. That fueled us with inspiration and Grey Hat Developer was born.
Will you teach my child to hack?
No. Your child already knows how to hack. 🙂
How do I sign up for training and what do I need?
Signing up is simple. Just contact us and let us know that you’re interested. One of our reps will guide you through the on-boarding process. In most cases, all you’ll need is a solid internet connection, a compatible device, the patience of Job, and the desire to learn.
Are your services expensive, there aren’t any rates listed on any of your products or services?
As mentioned, we understand that everyone’s budget and requirements are unique. At this time there are no “fixed” prices on any of our services. We aim to get a feel for your project as a whole before we throw any numbers in your face. Contact us for a quote on your next project or idea.
Blog / Latest News
Hacking WordPress 101
Hacking WordPress 10125MAY, 2022Day 6Hacking WordPress 101100 Days of HackingInstead of moving linear through the Bug Bunty Path on HTB, I wanted to veer off path a sec and jump ahead to Hacking Wardress. With a user base that stretches as far and wide as WordPress...
Analyzing Unknown Binaries- Dynamically
Analyzing Unknown Binaries- DynamicallyQuintius, Day 2, 100 Days of Hacking22 May 2022When I said this journey was not going to be linear in nature, Day 2 is an example of that. Although I’m writing this on Day 5, the events occurred on Day 2. My initial curiosity was...
Sensitive Data Exposure and HTML Injection
Sensitive Data Exposure & HTML Injection21MAY, 2022Days 3 & 4Sensitive Data Exposure & HTML Injection100 Days of HackingToday I’ll be trotting along the adventurous Bug Hunting path. I’m forcing myself to empty all previous knowledge that I possess about...
Listing the database contents on non Oracle databases
SQL INJECTION ATTACKListing database contents on non Oracle DatabasesQuintius, Day 1, 100 Days of Hacking18 May 2022This is officially Day Two, but since it’ll be the first day writing about what I covered, we’ll let this be the official Day One. I'll start by...
100 Days of Hacking
100 Days of Hacking16MAY, 2022I've been away from pen testing specifically since about the first of the year. As much as I abhorred the fact of having to take a hiatus, I must admit that taking that long of the break, ironically, had its benefit. Namely, coming back...
The Twelve Keys of the Hacker’s Craft
The Twelve Keys Of The Hacker's CraftQuintius, Cybersecurity Consultant, Texas2 January 2022Photo by Markus Winkler on UnsplashI often post useful quotes to the timeline of my social media profiles. A visitor to my profile would find these quotes appearing often, in...
What’s missing in Cybersecurity?
Photo by Brittani Burns on UnsplashQuintius, Cybersecurity Consultant, Texas28 January 2022This post was inspired by three words- "women in tech". While the those words by themselves kind of just hangs in the air without any context, what transpired of them was rather...
An Incidental Encounter with a Threat Actor
An Incidental Encounter with a Threat ActorQuintius, Cybersecurity Consultant, Texas17 January 2022As a healthy exercise in reconnaissance and utilizing an OSINT methodology, I found my guy, or entity, or account behind a shady email and penetration testing proposal....
The Grind
However, at the tech support gig I remember walking an eighty something year old lady through the process of hard resetting her wireless router, then re-configuring her wireless network and successfully connecting to the internet
What’s standing in your way?
02January, 2022Sometimes in life one reaches a point of realization that there's not anythingessentially "standing" in the way of them doing something that they truly want to do. That's easier said than done when one considers "conditions". Physical, emotional,...
Get In Contact With Us
Office
704 W. 15th Street
San Angelo, Tx. 76903
Hours
M-F: 8am - 10pm
Sat. 10am - 3pm
S: Closed
Call Us
(432)212-8959