top of page
  • DEFCON
  • blackHat
  • LinkedIn Social Icon

Below are some of the tools (Not All) and Operating Systems that we worked with in both Network Security and Technology Forensics. Each of these tools and many more are key to being an effective Penetration Tester, Forensic Investigator and Network Security Analyst.

Welcome to my UAT Portfolio

© 2023 by ADAM SCHARF. Proudly created with Wix.com

bottom of page