How I hacked an ESA's experimental satellite.
Or how to reverse engineer new space implementations & architectures.
A practical demonstration of possible attack scenarios allowing a malicious actor to bypass security controls in your corporate network and obtain high privileges in important systems.
An in-depth hunt for business logic flaws and implementation vulnerabilities in applications of any kind, from large cloud-based solutions to embedded and mobile applications.
Specialized research focused on identifying security problems related to mission-critical components of modern transportation infrastructure, from Automotive to Aerospace.
Detailed evaluation of highly-interconnected devices and their backend infrastructure, revealing vulnerabilities in firmware, network, and application layers.
Providing you with a complete picture of the behavior and functionality of specific malware files.
Analysis of the evidences relating to an attack, leading to the creation of a comprehensive report detailing the process of the attacker, then fixing these weaknesses.
Detailed analysis of the inner working of a given application or program. Allowing you to build product around it, or to better understand your competitors.
Recover data from closed web systems, bypassing all anti-bot solutions.
Building of your project based on specifications.
Or how to reverse engineer new space implementations & architectures.
I'm passionated about CyberSecurity and Computer Science since my childhood. I now help companies to develop their CyberSecurity strategies and to better undertand this world. I also like to write articles and give conferences about my side projects.
French, English (fluent)
Available
Or how to play YouTube videos on you SONOS, easy and for free.
Or how to reverse engineer React Native apps, and abuse API.
Or how to reverse engineer new space implementations & architectures.
Let's keep in touch !
mm.didelot@deadf00d.com
Monday to Friday (10am – 6pm)
Phone: +33785931795
Fax: unavailable