Skip to content
View kaotickj's full-sized avatar

Highlights

  • Pro

Block or report kaotickj

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kaotickj/Readme.md

Logo

Hello! My name is Johnny Watts. I am a Professional PHP Website Developer and Cyber Security Consultant in Southeast Tennessee. I began my life of coding around 1982 writing text based adventure games in BASIC on my TRS 80 and later my Commodore 64. I continuously strive to learn and grow in the ever-evolving fields of web development and cybersecurity.

I've been involved in the Cyber Security and Web Development industries since the Internet's Infancy with a career spanning more than 30 years. I help businesses enhance their online presence and security by creating fast, responsive websites that are loved by visitors and search engines alike.

Special Skills

Website/Web Application Development

I specialize in custom coded PHP Website Design using HTML5 and CSS3. My battery of skills includes more than a dozen coding languages, giving me a broad flexibility and a solid foundation for adapting to new and evolving web development technologies.

Search Engine Optimization

I am highly skilled at developing Keyword Strategies designed to Maximize Search Engine Results ranking through a Complete Keyword and Local Competitor Analysis and then implementing those strategies to both onsite and offsite SEO.

Cybersecurity Consulting

HIPPA, PCIDSS, ISO27001 auditing. Penetration testing. Computer forensic investigation. Risk Management. IT Security Training. Incident response. Malware analysis. Expert Witness in Cyber Security/Computer Forensics Criminal Defense cases.

PUBLICATIONS:

I am the author of the following:

Links

Social

THM Badge

Pinned Loading

  1. K-Sploit K-Sploit Public

    Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit simplifies repetitive metasploit functions such as generating …

    Shell 14 1

  2. The-Not-So-Simple-PHP-Command-Shell The-Not-So-Simple-PHP-Command-Shell Public

    This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.

    PHP 20 8

  3. PayloadForge PayloadForge Public

    Payload Forge is an advanced payload generation tool developed for cybersecurity professionals, red teamers, and ethical hackers. It allows users to craft and customize payloads for security testin…

    Python 5

  4. persistenceDetector persistenceDetector Public

    A Python program to detect malicious registry persistence entries in the WIndows Registry.

    Python 9 4

  5. typosquatterBuster typosquatterBuster Public

    This script detects typosquatting domains by generating typo variations of a given domain name, checking if they return a valid HTTP response, and running a WHOIS lookup to determine if the domain …

    HTML 8

  6. Apache-Service-XAMPP-WindowsPrivEsc-Disclosure Apache-Service-XAMPP-WindowsPrivEsc-Disclosure Public

    A critical vulnerability in XAMPP's default Apache service settings on Windows systems jeopardizes integrity, confidentiality, and availability. Discovered by Security Researcher Kaotickj, this fla…

    4