_____ _____ ( ___ ) ( ___ ) | |~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| | | | ██████╗ ██████╗ ██████╗ ██████╗ █████╗ ██████╗ ███████╗ █████╗ ██████╗ ██████╗███████╗ | | | | ██╔════╝██╔═══██╗██╔══██╗██╔══██╗██╔══██╗ ██╔══██╗██╔════╝██╔══██╗██╔══██╗██╔════╝██╔════╝ | | | | ██║ ██║ ██║██████╔╝██████╔╝███████║ ██████╔╝█████╗ ███████║██████╔╝██║ █████╗ | | | | ██║ ██║ ██║██╔══██╗██╔══██╗██╔══██║ ██╔═══╝ ██╔══╝ ██╔══██║██╔══██╗██║ ██╔══╝ | | | | ╚██████╗╚██████╔╝██████╔╝██║ ██║██║ ██║ ██║ ███████╗██║ ██║██║ ██║╚██████╗███████╗ | | | | ╚═════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝╚═╝ ╚═╝ ╚═╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚══════╝ | | | | | | | | ███╗ ██╗███████╗████████╗██╗ ██╗ ██████╗ ██████╗ ██╗ ██╗ | | | | ████╗ ██║██╔════╝╚══██╔══╝██║ ██║██╔═══██╗██╔══██╗██║ ██╔╝ | | | | ██╔██╗ ██║█████╗ ██║ ██║ █╗ ██║██║ ██║██████╔╝█████╔╝ | | | | ██║╚██╗██║██╔══╝ ██║ ██║███╗██║██║ ██║██╔══██╗██╔═██╗ | | | | ██║ ╚████║███████╗ ██║ ╚███╔███╔╝╚██████╔╝██║ ██║██║ ██╗ | | | | ╚═╝ ╚═══╝╚══════╝ ╚═╝ ╚══╝╚══╝ ╚═════╝ ╚═╝ ╚═╝╚═╝ ╚═╝ | | |___|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|___| (_____) (Actual Learning + Awareness Not Just Tutorials) (_____) Intelligence Networks ┌────────────────────────────────────────────────────────────────────────────────────────────────┐ │ - OSINT (OPEN SOURCE Intelligence) │ │ │ │ - CSINT (Closed Source Intelligence) │ │ │ │ - Soical Engineering │ │ │ │ - Digital Cyber Crimes │ │ │ │ - Equipment Awareness │ │ │ └────────────────────────────────────────────────────────────────────────────────────────────────┘ ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓ ┃ Independent Contractor ┃ ┃ Malware analysis ┃ ┃ Cybernetic analysis ┃ ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛ https://myth.rip/hajimecobra OSINT = Doxer For Hire (Research analysis Contractor) ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓ ┃ Work Is Paid Based On Performance and Professionallity ┃ ┃ Prices Will Be Displayed Based On What Resources Are Used With Proper Documentation Of Said Items┃ ┃ More "Services" Will Be Listed As Potentional Services ┃ ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛ - 𝙿𝚛𝚒𝚟𝚊𝚝𝚎 𝚃𝚞𝚝𝚘𝚛𝚒𝚗𝚐 𝙿𝚊𝚌𝚔 - 𝚆𝚊𝚝𝚌𝚑𝚎𝚍 𝙳𝚘𝚐𝚜 𝙿𝚊𝚌𝚔 (Courses With Text File + Videos) (Black Market Exploits) (Unreleased Educational Leaks) (Unreleased Data Breaches) (Unreleased Resources) (Unreleased Configs + Presets) (UnReleased Tools + Logs + PreTargets) All Mearly Thoughts But Will Update With Prices If I do Consider