• [CONTACT]
    • MAIL :: contact [at] adversec [dot] com
  • [SOCIAL]
    • GITHUB :: takeshixx
    • TWITTER :: @_takeshix
  • [AFFILIATIONS]
    • CAPTURE THE FLAG (CTF)
      • Hackademics :: Co-founder, member until 2013
      • Kernel Space Invaders :: Co-founder
  • [PRESENTATIONS]
    • Lifting the Fog on Red Star OS
      • 32C3 :: Slides :: Code
    • Woolim - Lifting the Fog on DPRK's Latest Tablet PC
      • 33C3 :: Slides
    • Exploring North Korea's Surveillance Technology
      • TROOPERS17 :: Slides
      • 6th No-Spy Conference :: Slides
  • [PROJECTS]
    • WEB
      • myip.space :: Returns a client's IP address, command line friendly, with IPv6 support. Visit myip.space/help for more information.
      • dprktech.info :: An effort to gather information, data and software from DPRK-related research.
      • kleber.io :: A pastebin with various features like paste encryption, file uploads, removal of metadata from uploaded files, an upload history and a RESTful, JSON-based API.
    • TOOLS
      • deen :: Generic data encoding/decoding application built with PyQt5.
      • KNXmap :: KNXnet/IP scanning and auditing tool for KNX home automation installations.
      • WebFixy :: On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.
      • hb-test.py :: Proof-of-Concept code for Heartbleed (CVE-2014-0160).
      • dprkdict :: A web-based viewer for North Korean dictionary files provided by the E-C-K app.
      • python-ssllabs :: Python interface and command line client for the SSL Labs APIs.
      • ctfpwn :: An exploit scheduling and flag submission framework for attack-defense CTFs implemented with Python's asyncio module.