2023-04-04: Code Bible
2023-01-09: FHE: Learning with Errors
2023-01-08: FHE (Fully Homomorphic Encryption): Introduction
2023-01-06: OPRFs (Oblivious Pseudorandom Functions)
2022-12-20: QUIC && HTTP3
2020-03-14: Certificate Pinning
2019-03-07: Android Malware Analysis
2019-01-24: Frida and Code Instrumentation
2019-01-06: Man-in-the-Middle
2018-09-19: C++ STL Management in Android NDK
2018-06-17: PDF Malware Analysis
2018-06-14: ASM Primer - Part 2
2018-06-10: ASM Primer - Part 1
2019-03-09: Windows Malware Analysis - Part 2
2018-06-03: Windows Malware Analysis - Part 1
2019-01-20: Write-up of PicoCTF 2018
2019-01-18: Write-up of CNIT 124 p19x
2018-12-29: Sectalks BER0x02 CTF Write-up
2018-12-09: Review of samsclass.info and CNIT 127
2018-12-07: Sectalks BER0x03 CTF Write-up
2018-11-09: SANS SEC575 Review
2018-06-02: SANS FOR610 Review
2016-12-25: Serious Cryptography
Public Projects
Conjunct: Drop-in Clang Replacement
SacredStar: Library for Tropical and Sidereal Astronomy Calculations (WIP)
Fridafier: Frida Injector
Archheritage: Birth Time Rectification using Divisional Charts
Plissken: Privacy-first, Zero-Knowledge Password Authentication Suite
Decrypticon: A Java-layer Android Malware Simplifier
RAKE.go: Golang port of Rapid Automatic Keyword Extraction Algorithm (RAKE)
Mobsec Toolbox: Collection of Android & iOS malware analysis scripts
RexLogger: Smali drop-in class for logging disassembled apps
Stripper: ELF binary sections table remover
WhiteStrings: Go implementation of Simon White's String Similarity Algorithm
Randomware: POC Linux Ransomware
Nucleas Engine: POC D3D10 Game Engine
ProceduralDungeon: Two methods to generate truly-random dungeons in Unity3D
Course: iOS Development for Android Devs
Course: React Native for Mobile Devs
Talks
The Hack Summit 2023: Obfuscation Technologies in Mobile Apps
The Hack Summit 2023: Zero-knowledge Identifiers
DefCamp 2023: Nothing To Hide: Privacy-Preserving Cryptographic Authentication In Practice
Fablecon 2022: Nothing To Hide: Privacy-Preserving Cryptographic Authentication In Practice
BSides Krakow 2022: Nothing To Hide: Privacy-Preserving Cryptographic Authentication In Practice
Android Security Symposium 2020: Semi-Interactive Simplification of Hardened Android Malware
Slides
Video
R2Con 2020: Semi-Interactive Simplification of Hardened Android Malware
Slides
Video
DefCamp 2018: Introduction to Reversing Malware
DefCamp 2018: Stealing Traffic: Analyzing a Mobile Fraud Operation
BSides Ljubljana 0x7E3: Reversing Mobile Malware
RuhrSec 2019: Reversing Fraudulent Apps
HITB Amsterdam 2019: Reversing Mobile Malware
Video
samsclass.info CNIT 128 Spring 19 guest lecturer: Analysing VikingHorde
Nanosec 2019: Code Execution Analysis in Mobile Apps
OWASP Berlin 20-03-31: Software Protection
2023-04-01: Just Like a Star
2022-11-21: A Fallen Star
2022-05-18: Prophet
2022-05-04: Memory Man
2022-05-04: All Words Vanished
2022-03-10: Silence
2021-01-19: The Great War for Civilization
2021-01-05: The Forge and the Crucible
2020-03-14: Language and Though of the Child
2019-10-04: Seed of Truth
2019-07-22: The Quest for a Moral Compass
2019-05-20: Midnight Masquerade
2019-03-22: Four Archetypes
2018-12-25: On Human Nature
2018-12-20: Lucifer: The Devil in the Middle Ages
2018-08-18: Righteous Victims
2018-07-02: On Ideologies
2017-08-03: The Death of Ivan Illich
2017-06-02: The Sacred and The Profane
2016-12-18: The Modern Personality Market
Resume/CV (
Online
|
PDF
)
LinkedIn
GitHub
Twitter