. Researching the intended target via both open-source and dark-web channels . Scanning target networks and systems with commercial, open-source, or custom vulnerability scanners . Designing a plan of attack that can include exploiting software vulnerabilities, systemic vulnerabilities, social manipulation, or any combination of those factors . I can create new cryto-currency on the blockchain network and also recover your bitcoin wallet. I am available for long-term projects.