My name is Olivia Gallucci. I am an offensive security engineer, freelance penetration tester, and undergraduate student. I am double-majoring in Cybersecurity and Computer Science, and minoring in Open Source Software and Free(dom) Culture.
Sporadically, I post on a blog about security, open source, and productivity. Consider subscribing!
Services
My expertise lies in penetration testing, software security consulting, tooling, and exploit development to improve individual and business security risk profiles. Whether you are looking to expand existing penetration testing capabilities, or require custom exploits for specific security scenarios, I have you covered!
Penetration Testing
- Conduct comprehensive penetration tests to identify vulnerabilities and weaknesses in systems, applications, and networks.
- Perform risk assessments to understand a company’s unique risks and threat landscape.
- Develop tailored action plans to strengthen security posture by assessing potential risks and their impact on the organization.
Software Security Consulting
- Review and analysis of an organization’s codebase(s) to identify security flaws.
- Development of recommendations for fixing identified security issues.
- Supervision of remediation efforts, implementation of patches, and establishment of effective security policies and procedures.
Tool Development
- Custom crafting of specialized penetration testing tools for network reconnaissance, vulnerability identification, and exploitation.
- Tailoring tools to meet the unique security challenges of each organization.
- Streamlining the testing process and providing resources for thorough security assessments.
Low-Level Exploit Development
- Creation of sophisticated, reliable exploits targeting specific vulnerabilities in software, networks, or systems.
- Precision engineering of exploits to simulate real-world attacks in security posture assessments.
- Illumination of risks and testing of remediations to enhance an organization’s security measures.
Free Consultation
If you are interested in my services or curious about how my tooling and exploit development services can benefit your organization, I invite you to schedule a complimentary 25-minute consultation where we can discuss your specific needs and how my services can align with your security objectives.
If you do not find any available slots for the next 45 days or encounter any issues with my services, please email me.
Recent Posts
Asymptotic Notation: Big O, Omega, and Theta
Asymptotic notation is the linguistic and mathematical bridge that allows developers to discuss the scalability and efficiency of algorithms.
Keep reading…Algorithm Development and Analysis
Algorithms are step-by-step procedures designed to solve problems. This post explores how algorithms are used in computational finance.
Keep reading…IDS Security Using Decision Trees and Neural Networks
Learn how we created an IDS that achieved accuracy rates of 94.4% for misuse detection and 99.0% for anomaly detection.
Keep reading…Subscribe
🌸👋🏻
Let’s take this to your inbox.
Join 9,500+ followers! You’ll receive occasional emails about whatever’s on my mind—offensive security, open source, academics, boats, software freedom, you get the idea.
Resume Reviews
I offer 1-hour resume review sessions, and 25-minute social and career chats.
All meetings are free, and serve as a way for me to give back to the software and security communities.
If no sessions are open within the next 45 days, or something appears broken, please email me.
Search
Categories
Tags
Academics (17) Algorithmic Performance (2) Algorithms (3) Artificial Intelligence (2) Assembly (5) Athletics (3) Benzinga (1) Big 4 (1) Blog (73) California (1) Coding (1) Computational Finance (2) Congressional Award (3) Content Creation (1) CrowdStrike (1) Cyber Defense Magazine (8) Defensive Security (1) Discord (1) Etiquette and Style (10) Free and Open Source Software (15) Hacking (9) HFOSS (8) High School (1) Infosec (2) Internships and Co-Ops (5) Lancaster News Paper (4) Linux (2) Low Latency (2) Machine Learning (2) Malware (1) Mathematics (2) Open Source (24) Optimization (2) Phillip (1) Phillip Wylie Show (2) Prelude (1) Press (5) PRWeb (1) Reading (1) Research (6) RITSEC (12) Rochester Institute of Technology (37) Software Development (4) Travel (3) Webdev (5)
Contact
Olivia Gallucci
I prefer video chats via Google Meets. Feel free to schedule one with me using ZCal.
If that is not an option, the best way to reach me is via Signal or email.
Icons by icons8.com
You must be logged in to post a comment.