Since 1997, people on and off the internet mostly know me as “e-sushi”. I am a well-vetted cross-platform software development expert, an experienced cyber security specialist, as well as a seasoned graphic design professional who embraces visual communications across all media.
During the past three decades, I served the military of two different countries, helped startups evolve into full-blown businesses, enhanced the information security of major corporations and institutions, and have been featured in a multitude of books and magazines around the globe.
I am currently available for remote and/or localized contract work offers. I’m willing and able to relocate worldwide whenever it makes sense and can be embedded or operate detached. Proactive defensive and/or offensive cyber security only. Companies operating under stealth mode are preferred, but not a requirement.
To socialize, follow me at Twitter.
For more private message exchanges, send an email to firstname.lastname@example.org.
PGP key: email@example.com_0xEF8A2E910368F932_pub.zip
Additional layers of encrypted communication are available upon request only.
minibin by e-sushi
Quick, easy, and completely configurable recycle bin for your Microsoft Windows system tray area.
diskeject by e-sushi
Eject your disk(s) with ease using this tiny software for Microsoft Windows operating systems.
3rd party links
recent quotes and/or mentions
infosec & Co.
- BGP Toolkit
- Awesome Pentest Cheat Sheets
- Penetration Testing Tools Cheat Sheet
- Payloads All The Things
- Offensive Security Bookmarks
- Pentest Bookmarks
- Bellingcat’s Online Investigation Toolkit
The website, and all data and services available via this website, are provided “as is” and for “use at own risk”. The author disclaims all warranties with regard to this website and all data and services available via this website including all implied warranties of merchantability and fitness.
In no event shall the author be liable for any special, direct, indirect, or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of this website, or any data or service available via this website.
privacy and security
This website uses access logs to ensure network integrity and system security. Collected information includes: timestamp, internet protocol address, user agent string, requested URL, referring URL, and resulting HTTP code. Access log data will not be shared with any 3rd party outside the hosting company, unless explicitly required by law or court order. To protect your privacy, access log data is destroyed within 24 hours after processing.
To confirm the security of the e-sushi website (e-sushi.net), you might want to check the Mozilla Observatory Report of e-sushi.net for its A+ rating, scoring way more than 100 out of 100 while passing all 11 tests.