-
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
421 lines (397 loc) · 22.8 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<!-- Page Thumbnail for Social Media -->
<meta property="og:image" content="images/emergency.png">
<meta property="og:title" content="Emergency Response Security Group">
<meta property="og:description" content="Boutique Cyber Security Services Since 1337">
<meta property="og:url" content="https://cyb.ersecurity.com">
<meta name="description" content="Emergency Response Security Group - Boutique Cyber Security Services Since 1337. Offering specialized services in offensive security, malware research, forensics, OSINT, incident response, and more.">
<meta name="keywords" content="cyber security, security, tech, technology, 1099, aggregation, attack, attacksurface, attackvectors, bash, blog, blogging, blueteam, brands, breach, bug bounty, bug sweeps, bugs, c programming, cats, cellphone, cellular, ceos, ceotalks, ceotips , cicd, ciso, cisolife, cisos, cloud, cloud security, cloud security engineer, cobol, computer security, consultant, consulting, corporations, crime, custom cyber security, cyber, cyber security analyst, cyber security architect, cyber security engineer, cyber security researcher, cyberattack, cyber attacks, cyber awareness, cyber awareness month, cybercrime, cyber criminals, cyber defense, cyber security, cyber warfare, dark web, data breach, data breach researcher, data breach, data breaches, datas ecurity, defense, digital footprint analysis, directorjobs, directors, economy, elastic, electric consulting, electric consulting llc, elk, email, emergency, emergency response, emergency response security group, employment, encoding, encryption, engineering, ethical hacking, ethical hackers, ethical hacking, executive, executive protection, experience, experience , exploit development, exploitation, exploits, footprint analysis, forensics, fortran, fraud, gdpr, go lang, google, hacker, hackers, hacking, hackingnews, hackingtools, hacks, healthcare, hipaa, hiring, hiring engineers, hiring talent, hiring tech, incident response, incident response, information security, information technology, infosec, infosecurity, intel, international law, investigations, ir, it security, security operations , cyber jobs, cyber security jobs, lead cyber security engineer, lead cyber security analyst, lead cyber security architect, lead cyber security researcher,cyber security linkedin, log aggregation, logging, malware, malware analysis, malware research, manager development, manager jobs, manager life, managers, marketing, monitoring, reverse engineering, network, network monitoring, network security, networkingskills, networksecurity, noc, offense, open-source skiptracing, pen testing, penetration testing, phishing, policy, privacy, privacy law, private investigation, program building, public investigation, python, recruiters, recruiting, reddit, redteam, research , resume , retainer service, retainer subscription, sales, scam, security, security architecture, security development, security law, security research, securityawareness, securitynews, securityprofessionals, securityresearch, senior cyber security engineer, senior cyber security analyst, senior cyber security architect, senior cyber security researcher, skiptrace, skiptracing, small business, smishing, soc, social engineering, socialengineering, spam, splunk, static code analysis, subscription service, tech, techcommunity, technology, technology blog, testing, texting, text messages, text messagespam, text messaging, threat, threat analysis, threat landscape, threat research, virus, vulnerability, worm, zero day, probono forensics, victim services, victim resources, stalking victim resources, stalking resources, restraining order resources, abuse help, stalker help, victim help, free help stalker, Rhiannon Williams, Rhiannon Portwood, Dylan Williams, Woodson Portwood, Seattle Security, Seattle cyber security, seattle cybersecurity, seattle tech scene, Portland Security, Portland cyber security, Portland cybersecurity, Portland tech scene, Kansas City Security, Kansas City cyber security, Kansas City cybersecurity, Kansas City tech scene, Oregon Security, Oregon cyber security, Oregon cybersecurity, Oregon tech scene, 1337 hacker, hackers, victim services, pro bono, digital forensics, crime, stalking, justice, evidence collection, law enforcement support, forensic analysis, emergency response security group, Rhiannon Williams, non-profit, victim support, digital evidence">
<meta name="author" content="Emergency Response Security Group">
<meta name="robots" content="index, follow">
<meta property="og:type" content="website">
<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:title" content="Emergency Response Security Group">
<meta name="twitter:description" content="Boutique Cyber Security Services Since 1337">
<meta name="twitter:image" content="images/emergency.png">
<title>Emergency Response Security Group</title>
<script>
document.addEventListener('copy', function(e) {
e.preventDefault();
});
</script>
<script>
document.addEventListener('contextmenu', function(e) {
e.preventDefault();
});
</script>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-QMLPX8RRD8"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'G-QMLPX8RRD8');
</script>
<style>
body {
font-family: 'Courier New', Courier, monospace;
margin: 0;
padding: 0;
background: #000000;
color: white;
text-align: center;
font-size: 20px;
-webkit-user-select: none;
-moz-user-select: none;
-ms-user-select: none;
user-select: none;
}
header, main, footer {
padding: 10px;
text-align: center;
font-size: 20px;
-webkit-user-select: none;
-moz-user-select: none;
-ms-user-select: none;
user-select: none;
}
nav {
font-family: Courier New', Courier, monospace;
color: #9999ff;
background: #000000;
display: flex;
justify-content: center;
font-size: 20px;
flex-wrap: wrap;
}
nav a {
font-family: Courier New', Courier, monospace;
color: white;
padding: 14px 20px;
text-decoration: none;
display: block;
font-size: 20px;
animation: fadeIn 2s ease-in-out;
}
nav a:hover {
font-family: Courier New', Courier, monospace;
background: #df1313;
color: white;
padding: 14px 20px;
text-decoration: none;
display: block;
font-size: 20px;
animation: pulse 1s infinite;
}
@keyframes fadeIn {
from { opacity: 0; }
to { opacity: 1; }
}
@keyframes pulse {
0% { transform: scale(1); }
50% { transform: scale(1.1); }
100% { transform: scale(1); }
}
.content {
animation: slideIn 1s ease-in-out;
}
@keyframes slideIn {
from { transform: translateY(100px); opacity: 0; }
to { transform: translateY(0); opacity: 1; }
}
#services {
margin: 20px auto;
}
.services {
text-align: center;
color: white;
font-size: 20px;
}
.scroll {
text-align: center; /* Ensures text within the div remains left-aligned */
padding: 1px; /* Optional: adds some spacing inside the div */
font-size: 20px;
font-family: "Courier New", Times, serif;
flex-wrap: wrap;
}
.links a {
color: #fc03a5;
text-decoration: none;
font-size: 20px;
}
.links a:hover {
font-family: "Courier New", Times, serif;
background: #ffe6ff;
color: #b00274;
text-decoration: underline;
font-size: 20px;
}
.home {
font-family: "Courier New", Times, serif;
text-align: center;
color: white;
font-size: 20px;
}
.exploit {
font-family: "Courier New", Times, serif;
text-align: center;
color: white;
font-size: 20px;
}
.container {
display: flex;
flex-wrap: wrap;
gap: 20px;
}
.column {
flex: 1;
min-width: 200px;
}
.checkbox {
display: grid;
flex-direction: column;
grid-template-columns: 1fr 1fr 1fr ;
align-items: center;
gap: 10px;
max-width: 300px;
margin: auto;
}
.checkbox div {
margin: 5px 0;
}
table {
width: 100%;
border-collapse: collapse;
}
table, th, td {
border: 1px solid black;
}
th, td {
padding: 8px;
text-align: center;
}
.example {
background-color: blue;
color: #fc03a5;
}
@media (max-width: 600px) {
.checkbox {
grid-template-columns: 1fr; /* Single column for very small devices */
}
nav a {
font-size: 14px;
}
body {
font-size: 14px;
}
}
</style>
</head>
<body>
<header>
<font size="2">
<pre>
.-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-.
offen\sive-s\ecurity♥\malware\researc\h♥foren\sics♥os\int♥inc\ident-r\esponse\♥threat\hunting\♥corpor\ate-esp\ionage-\investi\gation♥\
' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `
</pre>
</h4>
</header>
</font>
<main>
<section id="home">
<div class="home">
<p>
<span style="font-family: "Courier New", Times, serif;">
<font color="red"><font size="8">E</font></font><font size="8">mergency </font><font color="red"><font size="10">R</font></font><font size="8">esponse </font><font color="red"><font size="10">S</font><font size="8">ecurity </font></font><font size="10">G</font><font size="8">roup </font>
</span>
</p>
<nav>
<a href="https://cyb.ersecurity.com/index.html#home">Home</a>
<a href="https://cyb.ersecurity.com/index.html#research">Research</a>
<a href="https://cyb.ersecurity.com/index.html#exploits">Exploits</a>
<a href="https://cyb.ersecurity.com/index.html#victimservices">Victim Services</a>
<a href="https://electric.consulting">Contact</a>
<a href="https://account.venmo.com/u/emergencyresponse">Pay Invoice</a>
</nav>
</div>
</section>
<font size="2">
<pre>
.-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-.
secur\ity-res\earch♥t\hreat-h\unting♥\reverse\engineer\♥inves\tigatio\ns♥scri\pting♥l\inux-uni\x♥host\ing♥reg\istrars\exploit\s♥vuln♥\
' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `
</pre>
</font>
<div style="position: relative;">
<img src="images/emergency.png" alt="Emergency Response Security Group">
<img src="images/transparent.png" style="position: absolute; top: 0; left: 0;" width="100%" height="100%">
</div>
<h1><font color="yellow"><font size="5"><p>Boutique Cyber Security Services Since 1337</h1> </font></font>
<main>
<font color="red">
<span style="font-family: "Courier New", Times, serif;">
<font size="10">E</font><font size="8">levate </font><font size="10">Y</font><font size="8">our </font><font size="10">P</font><font size="8">otential </font>
<p></p>
</span>
<font color="white"><b><font size="6"><p>Ditch the One-Size-Fits-All Bottleneck</p></font></font>
</font></b>
<p><h1><font color="green"><font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Book Today</a></b></font></font></font></h1></p>
<p>Are you tired of cookie-cutter solutions that don't fit your unique need? We offer a fully
customized approach tailored specifically to your business including elite skills in cyber security, private investigation and investigative journalism. We offer a crisp approach, say goodbye to long hold times and marketing focused or scare tactic consultant jargon—instead, you'll have direct access to a knowledgeable professional dedicated to enhancing and securing the threat landscape at your organization. I personally, (Rhiannon) specialize in Cyber Security with over two decades of experience. As we are building a portfolio all throughout the domestic United States, but registered out of Washington State and Oregon, I’m willing to offer introductory
rates as an advisor for security offerings as described.</p>
<br>
<p> I specialize in corporate espionage investigations, forensic investigations, threat intelligence programs, vulnerability management, incident response (including phishing, spam, and forensics), threat analysis, hunting, and research, public record investigations, automation and architecture, log aggregation, SIEM, open-source intelligence, configuration audits, technical remediation, and security research.
</p></font></font>
</font>
<h1> <font color="green"><font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Book Today</a></b></font></font></font></h1>
<p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p><br><br><br><span
<section id="intro">
<div class="intro">
<br><font color="red">
<span style="font-family: "Courier New", Times, serif;">
<font size="10">U</font><font size="8">nlock </font><font size="10">G</font><font size="8">rowth with </font><font size="10">E</font><font size="8">xpert </font><font size="10">G</font><font size="8">uidance</font>
</span>
</font>
<p></p>
<font color="white"><b><font size="6"><p>Strategic Insights, Tailored Solutions</p></font></font></b></font></font>
</b></span></font>
</div>
<p>Many businesses typically invest over $40,000 for basic services, but we offer more, for less.
It's true that we have developed a cost-effective monthly pricing structure that ensures you
receive top-tier consulting without the hefty price tag. This approach not only allows us
to earn your trust as high-quality consultants but also fuels the growth of our boutique Cyber
Security Firm. Whether you require expert consultation, detailed explanations, validation of
security concerns, comprehensive audits, or innovative guidance that blends critical and
creative thinking, we are here to assist. Our services are priced to be accessible for the level</p>
of value, ensuring that superior cybersecurity support is within your reach.</p></font>
</div>
</section>
<h1> <font color="green"><font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Book Today</a></b></font></font></font></h1>
<p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p><br><br><br>
<span style="font-family: "Courier New", Times, serif;">
<font color="red"><font size="10">N</font><font size="8">avigate the </font><font size="10">F</font><font size="8">orgotten </font><font size="10">A</font><font size="8">rt of </font><font size="10">A</font><font size="8">ccuracy </font></font>
<p></p>
</font>
</span>
<font color="white"><b><font size="6">Enhance your Defenses One Keystroke at a Time.<p></p></font></font>
</b>
<p>We offer tailor-made solutions and expert insights essential for any business, all at a price
that’s accessible for small to medium-sized business owners. Plus, We're based in Washington State and come highly recommended! Skip the overpriced services of large firms—let us help lighten
load and provide the vigilant oversight needed at a fair and transparent rate. We will provide you with custom solutions and a trained eye that every business needs at a cost small to medium business owners can afford. What’s better is that we're local to Washington, but we can work remotely anywhere within the domestic United States. My work comes with glowing reviews! Don’t get ripped off by an enterprise firm, allow me to take the weight off your shoulders and be the extra set of eyes for a reasonable rate.</p>
</div>
</section>
</font>
<br>
</font></section></font></section></span></font></font>
<br>
<h1> <font color="green"><font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Book Today</a></b></font></font></font></h1>
<p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p><br><br><br>
<section id="exploits">
<div class="exploit">
<span style="font-family: "Courier New", Times, serif;">
<font color="red"><font size="10">E</font><font size="8">xploit </font><font size="10">D</font><font size="8">evelopment </font></font></span>
<font color="white"><b><font size="6"><p>Unique Approach to Effective Exploitation</p></font></font></b>
<p>As an exploit developer, my role revolves around understanding, finding, and exploiting
vulnerabilities in software and systems. We begin by identifying potential vulnerabilities, either
through manual review, using tools that scan for common weaknesses, or by keeping up with
newly disclosed vulnerabilities, as well as identifying unknown.</p>
<p>Writing an exploit requires not just coding skills,but also creativity and persistence, as some vulnerabilities are complex and require sophisticated approaches to be exploited effectively.</p>
</div>
</section>
<br>
<br>
<h1> <font color="green"><font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Book Today</a></b></font></font></font></h1>
<p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p><br><br><br>
<br>
<section id="victimservices">
<div class="victimservices">
<span style="font-family: 'Luminari', Times, serif;">
<font color="red"><font size="10">P</font><font size="8">ro</font><font size="10">B</font><font size="8">ono </font><font size="10">V</font><font size="8">ictim </font><font size="10">S</font><font size="8">ervices </font></font></span>
<div class="links">
<p></p>
<font color="white"><b><font size="6"><p>Empowering Victims with Important Analysis</p></font></b></font><b></b>
<div style="position: relative;">
<img src="images/justice.png" alt="Justice for Victims">
<img src="images/transparent.png" style="position: absolute; top: 0; left: 0;" width="100%" height="100%">
</div>
<br>
<font size="5"><font color="red"><b>Catalogue Evidence</b></font></font>
<p>Emergency Response Security Group is committed to assisting victims of crime
and stalking by offering free digital forensics services. Eventually, this
service will be made into a non-profit. Our goal is to empower victims with
the tools and support they need for justice. Our team has a track record of
collecting and cataloging digital evidence, providing a comprehensive report
that law enforcement can easily act upon. Our services include comprehensive
digital forensics analysis of all digital assets. Evidence collection from
digital devices. Expert analysis and interpretation of digital data.
Preparation of detailed, organized reports for law enforcement.</p>
<br>
<font size="5"><font color="red"><b>Achieve Justice</b></font></font>
<p>The initial consultation will include a meeting to discuss potential</p>
<p>evidence and attack landscape you have currently. We will collect digital</p>
<p>assets and start analysis. This is meant to be the first pass, as law</p>
<p>enforcement will likely have their own team complete the analysis, but we</p>
<p>provide a catalog of evidence to make it easier for law enforcement to sift</p>
<p>through. Our law enforcement teams are often overburdened by caseload and</p>
<p>unable to see the full scope of what is going on unless a catalog can be</p>
<p>provided, which can be costly and time-consuming.</p>
<font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Apply Today</a></b></font></font>
<p>Our team will work with you to gather necessary digital evidence and will</p>
<p>analyze the collected data to uncover critical information. At the end, you</p>
<p>will receive a detailed report that can be easily understood and used by law</p>
<p>enforcement. If you or someone you know is a victim of crime and has digital</p>
<p>or technical assets involved, don't hesitate to reach out for a forensics</p>
<p>consultation. We are here to provide valuable analysis and documentation for</p>
<p>free in order to better help you achieve justice.</p>
<br>
<font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Resources</a></b></font></font>
</div>
</section>
<br>
<h1> <font color="green"><font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Book Today</a></b></font></font></font></h1>
<p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p><br><br><br>
<br>
<section id="research">
<div class="ioc">
<span style="font-family: 'x', Times, serif;">
<font color="red">
<font size="10">C</font><font size="8">utting </font>
<font size="10">E</font><font size="8">dge </font>
<font size="10">S</font><font size="8">ecurity </font>
<font size="10">R</font><font size="8">esearch </font>
</span>
<br>
<p></p>
<font color="white"><b><font size="6"><p>Complex Investigations, IOC's, and Malware Deep-dives.</p></font></b></font><b></b>
<div style="position: relative;">
<img src="images/ioc.png" alt="Indicators of Compromise">
<img src="images/transparent.png" style="position: absolute; top: 0; left: 0;" width="100%" height="100%">
</div>
<br>
<font size="5"><font color="red"><b>Evolving Threats are Always a Constant </b></font></font></font>
</span>
<p></p>
<p>In today's digital landscape, cybersecurity threats are constantly evolving, </p>
<p>making it important for organizations and individuals to stay updated via </p>
<p>any means neccesary. Our Indicators of Compromise (IoC) Dataset is </p>
<p>intended to provide you with actionable items on our research.</p>
<font size="5"><font color="red"><b><i>Project Sudden Exit</i></b></font></font>
<pre><code>
TO BE ANNOUNCED
</code></pre>
<br>
</div>
</section>
<h1> <font color="green"><font size="5"><font color="red"><b><a href="https://emergency.formstack.com/forms/booknow">Book Today</a></b></font></font></font></h1>
<p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p><br><br><br>
</main>
<footer>
=^..^= =^..^= © 2025 <a href="https://electric.consulting">Electric Consulting LLC</a> =^..^= =^..^=
</footer>
</body>
</html>