Back to HomeAnthony Rice III Logo

Welcome to My Virtual Resume. My Name is Anthony Rice III I am a Full Stack Developer with 7+ Years of Experience in Tech. a Security+ certified developer and cybersecurity professional passionate about building secure, scalable web applications and protecting digital systems from real-world threats. Have a look around and feel free to reach out if you have any questions or would like to CONNECT!

If you are a potential employer, recruiter, or just someone who wants to understand my skills and experience, you can download my resume below. It contains detailed information about my professional background, technical skills, and accomplishments. I hope it gives you a good overview of what I can bring to the table.

jordans

Procjects & Labs

Real Work, Real Results, Hands-On & Virtual.

Have questions about my roles or responsibilities? Don‘t hesitate to reach out — Id love to share more insights.

After 5+ Years, I‘ve Done It All

From full-stack platforms to artist portfolios, I design and develop tailored websites that blend functionality, creativity, and purpose — built to meet the unique needs of each client and industry.


Full Stack

Custom-built applications with both front-end and back-end functionality, optimized for performance, scalability, and user experience across devices.

E-Commerce

Secure, conversion-focused online stores with integrated payment systems, product management, and mobile-friendly shopping experiences.

Decentralized Application

Blockchain-powered apps with smart contracts, crypto wallets, and trustless functionality for DeFi, NFTs, or DAO platforms.

Artist Portfolio

Engaging portfolios for actors, dancers, and musicians, integrating reels, bios, and booking/contact features for talent outreach.

Full Stack
Full Stack

Projects That Prove It

Hands-on work that bridges theory and practice — showcasing real-world problem solving in web development, cybersecurity, and blockchain systems.

MetaSploit Escalation

✅ Exploit a vulnerability to get limited access on target system.
✅ Use local exploits to gain administrator or SYSTEM-level access.
✅ Create a new privileged account for persistent administrative access control.
✅ Establish persistence or move laterally to access other network hosts
hero templatefeature templatebento templatecards template

System Monitoring

✅ Identify target system components: CPU, memory, processes, services
✅ Use tools like Task Manager, htop, or Sysmon
✅ Monitor logs (Event Viewer, journald, syslog) for anomalies
✅ Investigate suspicious behavior using filters or alert thresholds
hero templatefeature templatebento templatecards template

Partition Encryption

✅ Launch VeraCrypt and select “Create Volume”
✅ Choose partition/device mode and select target drive
✅ Configure encryption algorithm and strong password
✅ Format and mount encrypted volume for secure usage
hero templatefeature templatebento templatecards template

Vulnerability Analysis

✅ Install and configure OpenVAS scanner and feed updates
✅ Define scan target and create scan task
✅ Run the scan and monitor progress through web GUI
✅ Review report for vulnerabilities, CVSS scores, and remediation steps
hero templatefeature templatebento template

Armitage Escalation

✅ Launch Armitage and connect to Metasploit RPC server
✅ Perform host discovery and identify vulnerable services
✅ Exploit vulnerability to gain initial access (meterpreter shell)
✅ Use privilege escalation modules or manual techniques for SYSTEM/root access
hero templatefeature templatebento templatebento template

SQL Injection

✅ Access WebGoat and select the SQL Injection module
✅ dentify injectable fields by submitting test inputs (‘ OR ‘1‘=‘1)
✅ Use crafted queries to bypass authentication or extract data
✅ Analyze results and learn mitigation using parameterized queries
hero templatefeature templatebento templatebento template