introduction
hiya~~
i'm ali.m - researcher by day, hacker by night.
this space contains fragments on hacking and research.
feel free to reach out to me if you have anything to share or questions to ask.
fragments on hacking
trivial pdf decoy for persistence
guide on creating a shortcut pdf decoy file that appears normal but executes malicious code.
includes more sophisticated example replacing decoy to appear as if a real pdf was executed.
indepth analysis of my first malware binary
indepth static and dynamic analysis of a chinese linked malware sample that uses Cobalt
Strike beacons. Shows my struggle with reverse engineering too ;_;
zerologon packet analysis
packet-by-packet zerologon exploration through wireshark and microsoft documentation.
invesigate a security whitepaper, key microsoft windows functions and bad cryptographic habits.
tiny wardriver
tiny embedded wardriver using esp32 (2.4GHz) discovers local area networks and records
ssid, signal strength, encryption protocol, longitude, latitude, altitude, date and time.
uses: esp32, neo-6m, 4-pin push button, ssd1336 display, arduino, bash scripting.
fragments on research
automatic modulation recognition across snr variability via domain adversary (VTC24)
using domain adversarial training on neural networks for signal classification on
simulated data. classify different modulations in varying SNR conditions.
explainable artificial intelligence enabled intrusion detection in the internet of things (ISICN24)
use shapley additive explanations on classifiers trained on intrusion detection samples.
analyze global and local feature representations that explain why the model is the way it is.
contact
For any inquiries or questions, please contact me using the email listed below: