Who is Haydies? Me my self and quite possibly some one else.


Shaolin introduced him self, and said he had asked every one to do like wise. News to me mate :-P or did that slip my mind? Can’t see how it could but one never knows…

So, any way, who the hell am I? I have known Shaolin for years, he might have some idea how many, I am on that old darknet site he mentioned, but do me and favour, and don’t look there, please? I look terrible and I’m ashamed :-P

Like Shaolin I to started with the whole computer thing when I was little. The order is a little haszy, but I am fairly sure I had the TI 994A before the little old specy. Though my use of them was a little differant. True, I did for a while spend many hours typeing code to find out later it didn’t work…. but before long I was coding my own stuff. In basic on the TI, and z80 assembler on the specy, pascal and modual 2 to on the Amstrad CPC, 6800 assembler and C on the ST….

TI, Spectrum, Comador, Atari ST, 386 and beyond, I have always live with a computer, though shockingly never games. My first consol was a ps2 and that is only 4 years old.

After many years of bedroom activites I definatly should be ashamed of (all with a keyboard – and check this? no net connection) I emerged in the bright old world, a whole host of dead technology and languages no one has used since the romans under my belt, and windows gaining popularity.

Fast forward, past VB, pal, and various noddy little things and I’m in to Delphi, oh my, was I in to Delphi. For 7 years I lived, breathed and probably bathed in the windows API and OOP. Gone was Delphi’s native event handlers, to slow, give me the raw message cue…. mutli threaded servers, no problem, n-tier CORBA clients… you name it, I did it.


Then I got bored.

But thats ok, no one wants desk top or server applications any more. So, a bit late to the party I had a go at ASP, and damn that stuffs ugly. PHP how ever, now thats the nuts, and thus I entered web development.

Some one once said I’d never be a web developer, but my first ever professional site went live to 2.5 million unique IPs in the first 48 hours, truely one of my proudest hours.

I’ve been doing PHP ever since, MySQL for most part but if its SQL, its all the same. Date in and data out, its all fairly much simple. Introduce some AJAX just to spice it up a bit, and we’re all having fun.

Where I am going from here, nobody knows, but I code, there for I am so what ever happens, what ever changes… I am a programmer :-)

Posted in: Authors

, ,


Latest Posts:


APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
GitLab Watchman - Audit Gitlab For Sensitive Data & Credentials GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an app that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally, this includes code, commits, wikis etc
GKE Auditor - Detect Google Kubernetes Engine Misconfigurations GKE Auditor – Detect Google Kubernetes Engine Misconfigurations
GKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security & dev teams streamline the configuration process
zANTI - Android Wireless Hacking Tool Free Download zANTI – Android Wireless Hacking Tool Free Download
zANTI is an Android Wireless Hacking Tool that functions as a mobile penetration testing toolkit that lets you assess the risk level of a network using mobile.
HELK - Open Source Threat Hunting Platform HELK – Open Source Threat Hunting Platform
The Hunting ELK or simply the HELK is an Open-Source Threat Hunting Platform with advanced analytics capabilities such as SQL declarative language, graphing etc
trape - OSINT Analysis Tool For People Tracking Trape – OSINT Analysis Tool For People Tracking
Trape is an OSINT analysis tool, which allows people to track and execute intelligent social engineering attacks in real-time.


Comments are closed.