Send a message to
Emeric Nasi

I am a French Security researcher. I worked as a developer for couple of years and then decided to create the Sevagas information Security blog in 2009 during a 35000 km (9 months) trip all around Australia :-). The goal was to publish tutorials, articles, and tools.

I founded in 2016 SEVAGAS Information Security to offer to my customers the results of my researches and experience in cybersecurity.

My previous assignments were to work as CyberSecurity Expert and Business coordinator and earlier security architect in energy field (SCADA and control systems). I also worked as consultant on subjects like code auditing, payment applications and PCI-DSS environment.

Contact
You can find news about the Sevagas website and myself on my twitter account .
My professional resume is available on my linkedin account.
You can contact me using the form below. If you need to contact me in a more confidential way, you can use this gpg iconGPG key or you can use ProtonMail and send a message to ena.sevagas[ at ]protonmail.com

Note: I am using my public identity on this blog, I and honest with you and expect the same in return. I will generally not answer to emails if I cannot link the senders to a real identity, especially if they concern exploit or malware writing.


Send a message

This author wrote:
How to create "trojanized" USB key for redteam/social engineering using ADS, shortcuts, HTA, macro_pack, etc. Drop DLL payload with stealth, no knowledge of target file-system, and no Internet (...)
Article published on 23 June 2018
How to hide Visual Basic Scripts HTA in other files and generate self playing HTA files without the .hta extension.
Article published on 7 February 2018
Quick exploration of the forensic/post exploitation possibilities using the GNU Linux swap memory and introduction to swap_digger tool.
Article published on 20 July 2017
This is another exploit implementation for TVT derived DVR/CCTV devices which have a root cmd injection vulnerability. It is based on routersploit framework, it checks exploitability in a (...)
Article published on 15 December 2016
As other members of CERTs I noticed the revival of VBA malware these past years, especially used to drop ransomwares. To better understand and for the fun, I decided to give a try and create my (...)
Article published on 11 July 2016