introduction

    hiya~~

    i'm ali.m - researcher by day, hacker by night.
    this space contains fragments on hacking and research.

    feel free to reach out to me if you have anything to share or questions to ask.
    

fragments on hacking

    trivial pdf decoy for persistence
                guide on creating a shortcut pdf decoy file that appears normal but executes malicious code.
                includes more sophisticated example replacing decoy to appear as if a real pdf was executed.
    
    indepth analysis of my first malware binary
                indepth static and dynamic analysis of a chinese linked malware sample that uses Cobalt
                Strike beacons. Shows my struggle with reverse engineering too ;_;
    
    zerologon packet analysis
                packet-by-packet zerologon exploration through wireshark and microsoft documentation.
                invesigate a security whitepaper, key microsoft windows functions and bad cryptographic habits.
    
    tiny wardriver
                tiny embedded wardriver using esp32 (2.4GHz) discovers local area networks and records
                ssid, signal strength, encryption protocol, longitude, latitude, altitude, date and time.
                uses: esp32, neo-6m, 4-pin push button, ssd1336 display, arduino, bash scripting.
    

fragments on research

        automatic modulation recognition across snr variability via domain adversary (VTC24)
                    using domain adversarial training on neural networks for signal classification on
                    simulated data. classify different modulations in varying SNR conditions.

        explainable artificial intelligence enabled intrusion detection in the internet of things (ISICN24)
                    use shapley additive explanations on classifiers trained on intrusion detection samples.
                    analyze global and local feature representations that explain why the model is the way it is.
    

contact

For any inquiries or questions, please contact me using the email listed below: