Home
NFC BUNNIES
Welcome! If you’re here, you probably scanned one of my NFC bunnies. I applaud your curiosity and hope you enjoy it! I 3D printed these models on my home 3D printer and used ISO 14443-3A Mifare Ultralight tags. These tags are rewritable on purpose, so you can use them as a quick shortcut for anything – location data, text messages, phone numbers, etc.
In order to overwrite the tag, you can download the NFC Tools Android app or any similar NFC writing application.
Q: Can I make malicious bunnies that redirect anywhere I want?
A: Totally! I don’t recommend it, but I’m also not your mother.
Q: Why did I find this in a restaurant/coffee shop/handed to me/on a window sill/at a conference?
A: Because they’re fun and make some people smile! I hope it’s not too much of a bother. I like to make fun toys and trinkets for friends, if it’s not your jam feel free to leave the one you found somewhere where it can get adopted.
Q: Are you a bad guy?
A: Nah. I just like to poke at things and improve them in any way that I can.
whoami
Hi! I’m a network security professional based out of Maine. I’ve been working in network security professionally since 2015. I started with computer hardware, building computers on commission to pay for school, then wandered my way into networks because they looked like fun to learn about. Eventually I got a job as a tutor, then a low-level analyst.
Soon, I started managing people and projects, working with some incredibly smart security professionals and learning from them what I could. I hopped into senior analyst work as soon as I got the chance and picked up steam doing a little of everything for a startup.
Today I write, admin, secure, and teach. I also run the Maine locksport/picking meetup based out of Thomaston, ME. My security skillset and experience as of 2023 includes:
- Programming and management languages: Java, SQL (Spark, mySQL,osquery)
- Scripting: Python, Ruby, Bash, PowerShell, DuckyScript
- SIEMs (management, ingestion, and log analysis): SecurityOnion, Splunk, LogRhythm, ELK, ArcSight, ManageEngine, Sumo Logic, FortiSIEM, Graylog, AlienVault
- Operating Systems (admin capacity): Gentoo, Pentoo, Ubuntu, Kali, Mint, Windows 7/8.1/10/11, Windows Server 2016/19/22, z/OS
- Forensics: FTK Imager, Autopsy, Cuckoo, YARA, Ghidra
- Network Traffic Analysis: Wireshark, Ettercap, tcpdump
- Security Testing Applications: Burp, Atomic Red Team, ZAP, Metasploit, aircrack-ng suite, gobuster, dirbuster, nmap, dnsenum, Maltego, sqlmap, Wfuzz, Bloodhound
- Security Testing Tools: HackRF One, Wifi Pineapple (Mk 3 – 7), DVB-T tuners for SDR, Flipper Zero, OMG Plug Elite, UberTooth One, Proxmark, Proxgrind ChameleonTiny
- Other relevant stuff: Technical writing, webinars, teaching, conference speaking, project management
Outside of security things I like to knit, crochet, spin yarn, read, write, and enjoy time outside with my animals.
Feel free to read some of my blogs or look at my presentations if you want. I also have contact info if you’d like to say hi or follow me on social media! I’ll likely start posting guides and other junk soon.