• [CONTACT]
  • Feel free to contact me via email at contact [at] adversec [dot] com or any of the following social network channels.

  • [SOCIAL]
    • GITHUB :: takeshixx
    • TWITTER :: @_takeshix
    • LINKEDIN :: [REDACTED]
  • [AFFILIATIONS]
    • CAPTURE THE FLAG (CTF)
      • Hackademics :: Co-founder, member until 2013
      • Kernel Space Invaders :: Co-founder
  • [RESEARCH]
    • PRESENTATIONS
      • Lifting the Fog on Red Star OS
        • 32C3 :: Slides :: Code
      • Woolim - Lifting the Fog on DPRK's Latest Tablet PC
        • 33C3 :: Slides
      • Exploring North Korea's Surveillance Technology
        • TROOPERS17 :: Slides
        • 6th No-Spy Conference :: Slides
    • TEXT
      • Dumping Decrypted Documents from a North Korean PDF Reader
      • Reversing and Patching .NET Binaries with Embedded References
      • Various writeups and scripts for easily running ARM VMs on QEMU with networking support.
      • Governmental Control of Digital Media Distribution in North Korea: Surveillance and Censorship on Modern Consumer Devices
      • Implementing an Obsolete VPN Protocol on Top of HTTP: Because Why Not?
      • Discover the Unknown: Analyzing an IoT Device
      • Cisco and the Maintenance Operation Protocol (MOP)
    • ADVISORIES
      • CVE-2016-6519 :: Cross-site scripting (XSS) vulnerability in the "Shares" overview in Openstack Manila before 2.5.1.
      • CVE-2017-8920 :: irc.cgi in CGI:IRC before 0.5.12 reflects user-supplied input from the R parameter without proper output encoding, aka XSS.
  • [PROJECTS]
    • WEB
      • kleber.io :: A pastebin with various features like paste encryption, file uploads, removal of metadata from uploaded files, an upload history and a RESTful, JSON-based API.
        • Kleber CLI :: Official command line client for kleber.io.
      • dprktech.info :: An effort to gather information, data and software from DPRK-related research.
        • dprkdict :: A web-based viewer for North Korean dictionary files provided by the E-C-K app. Available on dprktech.info/engdprk.
      • myip.space :: Returns a client's IP address, command line friendly, with IPv6 support. Visit myip.space/help for more information.
      • mirror.adversec.com :: A mirror for various internal and external projects. Supports TLS and IPv6.
    • TOOLS
      • deen :: Generic data encoding/decoding application built with PyQt5.
      • KNXmap :: KNXnet/IP scanning and auditing tool for KNX home automation installations.
      • WebFixy :: On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.
      • hb-test.py :: Proof-of-Concept code for Heartbleed (CVE-2014-0160).
      • python-ssllabs :: Python interface and command line client for the SSL Labs APIs.
      • CTFPWN :: An exploit scheduling and flag submission framework for attack-defense CTFs implemented with Python's asyncio module.
      • CTFPWNng :: A simple automation framework for attack-defense CTFs. (successor of CTFPWN)
      • csgo-overwatcher :: A tool that allows to investigate the actual suspects of CS:GO Overwatch cases.
      • ILSpy-CosturaPlugin :: A plugin for ILSpy that loads references that have been embedded as resources with Costura.
      • Nmap Scripts :: A collection of Nmap NSE scripts.
        • knx-gateway-discover.nse :: Discovers KNX gateways by sending a KNX Search Request to the multicast address 224.0.23.12 including a UDP payload with destination port 3671.
        • knx-gateway-info.nse :: Identifies a KNX gateway on UDP port 3671 by sending a KNX Description Request.
        • sstp-discover.nse :: Check if the Secure Socket Tunneling Protocol is supported.
        • ip-https-discover.nse :: Checks if the IP over HTTPS (IP-HTTPS) Tunneling Protocol is supported.
        • mop-discover.nse :: Detect the Cisco Maintenance Operation Protocol (MOP) by sending layer 2 DEC DNA Remote Console hello/test messages.
    • MISC
      • forpy :: Generic network traffic forwarding with Python's asyncio module. A simple blueprint script that can be extended to manipulate any kind of traffic running through it.
      • xss-board :: Example app for a simple Cross-Site Scripting (XSS) CTF challenge using Zombie.js.
      • laf :: An abandoned old script that searches for administrative login pages.