Send a message to
Emeric Nasi

I am a French Security researcher. I worked as a developer for couple of years and then decided to create the Sevagas information Security blog in 2009 during a 35000 km (9 months) trip all around Australia :-). The goal was to publish tutorials, articles, and tools.

I founded in 2016 SEVAGAS Information Security to offer to my customers the results of my researches and experience in cybersecurity.

My previous assignments were to work as CyberSecurity Expert and Business coordinator and earlier security architect in energy field (SCADA and control systems). I also worked as consultant on subjects like code auditing, payment applications and PCI-DSS environment.

Contact
You can find news about the Sevagas website and myself on my twitter account .
My professional resume is available on my linkedin account.
You can contact me using the form below. If you need to contact me in a more confidential way, you can use this gpg iconGPG key or you can use ProtonMail and send a message to ena.sevagas[ at ]protonmail.com

Note: I am using my public identity on this blog, I and honest with you and expect the same in return. I will generally not answer to emails if I cannot link the senders to a real identity, especially if they concern exploit or malware writing.


Send a message

This author wrote:
This is a POC to reproduce cve-2014-3631 Linux Kernel vulnerability. No exploitation here, just simple kernel panic.
Article published on 23 February 2015
Is it really that simple to bypass AV? In this paper I focus on how to fool antivirus emulation systems. I’ve set myself a challenge to find half a dozen of ways to make a fully undetectable (...)
Article published on 24 August 2014
I’ve found out a lot of people want to be able to encrypt string in a C or C++ software. There are a lot of methods available, some of them not very user friendly. Here is my own method of (...)
Article published on 29 June 2014
Short article presenting basic anti-debug and anti-disassembly techniques and a way to combine them to make stronger code armoring.
Article published on 17 May 2014
Injecting code into other process memory is generally limited to shellcode, either to hide the shellcode from Antivirus or to inject a DLL. The method described here is more powerful and (...)
Article published on 13 April 2014