Send a message to
Emeric Nasi

I am a French Security researcher. I worked as a developer for couple of years and then decided to create the Sevagas information Security blog in 2009 during a 35000 km (9 months) trip all around Australia :-). The goal was to publish tutorials, articles, and tools.

I founded in 2016 SEVAGAS Information Security to offer to my customers the results of my researches and experience in cybersecurity.

My previous assignments were to work as CyberSecurity Expert and Business coordinator and earlier security architect in energy field (SCADA and control systems). I also worked as consultant on subjects like code auditing, payment applications and PCI-DSS environment.

Contact
You can find news about the Sevagas website and myself on my twitter account .
My professional resume is available on my linkedin account.
You can contact me using the form below. If you need to contact me in a more confidential way, you can use this gpg iconGPG key or you can use ProtonMail and send a message to ena.sevagas[ at ]protonmail.com

Note: I am using my public identity on this blog, I and honest with you and expect the same in return. I will generally not answer to emails if I cannot link the senders to a real identity, especially if they concern exploit or malware writing.


Send a message

This author wrote:
In this post I am going to take the WNF code injection method described in https://modexp.wordpress.com/2019/06/15/4083/, and generalize it to execute remote code that was injected into any process.
Article published on 1 December 2019
Over the year several mechanisms were developed by vendors to prevent code injection. A common mechanism is to detect invalid start address of the injected thread. Here, as an example we are (...)
Article published on 5 September 2019
In this first part of the injection series, I am presenting how to inject and run code in a target process on Windows using the method called PE injection. This method allows a .exe file to (...)
Article published on 1 September 2019
A redteam oriented study of Windows Defender Exploit Guard Attack Surface Reduction. Analysis of several rules, what triggers them and how to bypass.
Article published on 24 February 2019
Fileless UAC bypass via COM hijack using sdtlc.exe auto-elevated process.
Article published on 23 January 2019