Skip to content
View pedramamini's full-sized avatar
👋
👋

Organizations

@OpenRCE @InQuest
Block or Report

Block or report pedramamini

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
pedramamini/README.md

Biography

Currently, Pedram focuses the majority of his time on InQuest (https://www.inquest.net). InQuest delivers two key technologies, Deep File Inspection (DFI) for real-time threat detection and "RetroHunting", a novel approach that leverages the power of hindsight to apply todays threat intelligence to yesterday's data. Commercially available as a SaaS email security add-on for Google Workspace (GSuite) / Microsoft O365, as a high-throughput on-premise network appliance, or via API. InQuest excels at malware analysis at global scale, you can follow our research efforts and tap into an everfresh source of data at our open research portal: https://labs.inquest.net

Pedram holds a computer science degree from Tulane University with minors in business, robotics, and mathematics. He began his professional career in 2002 as one of the founding members of iDEFENSE Labs, a security start-up in the Washington DC metro area which was acquired by Verisign in 2005. At iDEFENSE he architected and managed the Vulnerability Contributor Program (VCP) which consisted of a network of over 1,000 independent security researchers worldwide.

In 2005 Pedram moved to Austin, Texas to create the Zero Day Initiative (ZDI, http://www.zerodayinitiative.com) under the network security company TippingPoint. Similar to the VCP, the ZDI is a program for rewarding independent researchers for responsibly disclosing security vulnerabilities. This program has grown to be the largest and most successful of its kind. In the 5 years that Pedram ran the program, it unearthed and helped patch over 1,100 critical security flaws with contributions from over 1,600 researchers worldwide... that trend continues today. TippingPoint was acquired by 3Com and later Hewlett-Packard.

After the HP acquisition in 2010, Pedram founded and developed Jumpshot (archived website, Kickstarter launch), a consumer product for out-of-band malware removal. A unique software solution, Jumpshot differed from typical malware removal products in that the potentially infected computer is actually turned off. Jumpshot then took control of the system hardware and cleaned viruses and other undesirables from a forensic viewpoint with crowd-driven support from the cloud. A portion of the system was granted US patent #8812832. Jumpshot was unveiled from stealth mode in July of 2012 on the crowdfunding site Kickstarter. Soon after releasing the software to the general public, driven by excellent reviews on the efficacy of the product, Jumpshot was acquired by Avast. In September of 2013 Jumpshot was re-branded as GrimeFighter. (Please note, this is not the infamous data sciences firm Jumpshot.)

Pedram authored "Fuzzing: Brute Force Vulnerability Discovery", has presented at BlackHat, DefCon, RECon, Ekoparty, Microsoft Bluehat, ShmooCon, ToorCon and Virus Bulletin, and taught numerous sold out reverse engineering courses. His most recent in-person presentation was at Blackhat USA 2019:

Worm Charming: Harvesting Malware Lures for Fun and Profit

Recent blogs (@InQuest):

Publications and Citations

Fuzzing: Brute Force Vulnerability Discovery

Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system

OpenRCE: Open Reverse Code Engineering Community

Citations

Code

Digging Deeper

For an older talk but of particular interest to the vulnerability and exploitation markets and history, see his presentation from EkoParty Buenos Aires 2009 titled "Mostrame la guita! Adventures in buying vulnerabilities":

If you want to take a gander at a much younger albeit fatter Pedram, he's archived here unveiling the Paimei reverse engineering framework at the first RECON conference in Montreal.

Pinned

  1. InQuest Labs: Trystero Project - Goo... InQuest Labs: Trystero Project - Google vs Microsoft
    1
    #!/bin/env python
    2
    
                  
    3
    """
    4
    Leverage the open API from labs.inquest.net to query the Trystero project data and compare which vendor, between
    5
    Google and Microsoft "won" the most days from the given YYYY-MM-DD to now. Example:
  2. InQuest Labs Rule Generator InQuest Labs Rule Generator
    1
    #!/opt/research/venv/bin/python
    2
    
                  
    3
    """
    4
    IQ Auto DIFF leverages InQuest Labs API to collate a list of post DFI string features from both malicious (bad) and
    5
    seemingly benign (non) files. While ignoring gibberish, we'll next identify the string features exclusive to each set.
  3. InQuest Labs Daily Sample Harvest InQuest Labs Daily Sample Harvest
    1
    #!/bin/env python
    2
    
                  
    3
    """
    4
    This script is intended to be run via a daily cron job and will retrieve up to MAX_DAILY interesting samples with
    5
    relevant JSON metadata containing extruded layers, IOCs, etc.
  4. paimei paimei Public

    Forked from OpenRCE/paimei

    A reverse engineering framework written in Python that I developed but no longer maintain.

    Python 15 5

  5. sulley sulley Public

    Forked from OpenRCE/sulley

    A pure-python fully automated and unattended fuzzing framework which I wrote but no longer maintain.

    Python 5 1

  6. lazy-cd lazy-cd Public

    Path bookmarking for bash. I use this extensively throughout my day.

    Shell 20 1