dade grew up a screw up. He started from the bottom and now he’s here. He got low, he cranked that, he popped, locked, and dropped it. He has, on occasion, been known to shake that laffy taffy. Nowadays he just wants to lean back, forever.

When not living a life full of memes, dade likes to write. Most of the time that means tweets, but occasionally he writes longer things. A good example of the longer things he writes is this page that you, dear reader, are currently reading. As you can probably see by his carefree writing style, he doesn’t take himself very seriously. This is at least, like, 4 tweets worth of content.

dade had a bit of a rough life growing up, but that didn’t stop him from becoming awesome. He went off and got a degree in Business / Computer Information Systems, and then another degree in computer science (sorta) with a minor in economics. Throughout college, dade worked in web development and worked with Intel on automating testing of wireless cards. dade interned at Intel’s solid state drive division (NSG (NVM (Non-volatile memory) Solutions Group)) for a year before finishing college and eventually returning to Intel’s NSG to work in Quality & Reliability for Intel Optane devices for two years.

“But dade, I thought you were a hacker?”

Well you thought wrong, bucko. Jk, it was during dade’s time working at Intel that he made the transition into a security role. He volunteered on Intel’s red team and quickly became a very active participant in red team work. Within a year, dade was hired for a full time role on Intel’s red team. During this time, he did a lot of reconnaissance work and he wrote a lot of documentation. Oh, I guess he also got his OSCP, through a rather simple human-augmented loop of searchsploit -> metasploit -> root -> repeat. A bit over a year later, his time with Intel came to an end. He currently works on the red team for another large company (whom he does not speak for, btw).

dade also maintains a project called natlas, which provides a (hopefully) user-friendly way to do continuous scanning of network ranges and search all of the data. Gone are the days of cron jobs that run nmap and then complicated grep statements that look for the content you want. You can check out a demo version of the project at

dade has been involved in numerous things, including:

  • ACM Student Chapter President for 2 years
    • Organized two regional ACM style programming competitions
    • Organized a trip to a local-ish security conference for interested students
    • Organized a student outreach project for building computer skills
  • /r/blackhat moderator for 8ish years
  • /r/darknetdiaries new moderator
  • Guest appearance on Darknet Diaries #35
  • Occasionally captures some flags with b0tchsec
  • Revived the Sacramento hacker scene with defcon916
  • Wrote some CTF challenges for BSides PDX 2020, 2019, 2018
  • Content Creator and one-time host for Whose Slide Is It Anyway
  • CCDC At-Large Red Team for a year
  • Coached an AFA CyberPatriot team of high school and middle school students for two years, leading them to the national finals the second year.

If any recruiters are reading this, dade has 15 years of blockchain experience, 31 years of kubernetes experience, and 400 years of machine learning experience. On top of this, dade has been awarded the nobel peace prize for his work on sharing good vibes. If that wasn’t enough, dade was also awarded the ACM Turing award for his research into proving P = NP via a complicated series of image macros.

If you’d like to get in touch with dade, please join this conference call and wait for him to arrive.