I'm Ankur Tyagi, an infoSec enthusiast and security researcher. I use 7h3rAm (IPA: θˈɛɹam) as my handle and you can find me using it on most social platforms. At present, malware analysis, file-format decoding, and network traffic inspection are my primary areas of interest.
I've completed my graduate studies with a formal background in Computer Science and Software Systems. I started my professional journey with Vulnerability Assessment as the primary work domain but in a few years moved to Intrusion Prevention which eventually became my expertise. In an attempt to further improve infosec domain understanding, I moved to my present profile where I work as a Malware Researcher and get exposure to a wide array of concepts and ideas.
I have always been involved in research activities and continue to present my work at premiere security conferences throughout the world. This blog documents research ideas and lists updates on several topics of interest that span security, programming and problem solving in general. It is completely opensource and created using a minimal static site generator, that I developed, called Kalpi.
Though comments have been disabled explicitly, I certainly welcome feedback. If there's anything I can help with please let me know. I'm happy to help in any way I can so don't hesitate to get in touch. You can reach me via mail, , , and use : 61D79CCF for a confidential discussion.
This post demos a few nifty API endpoints from circl.lu that provide information on CVE and the vulnerabilities
The following post is a writeup for FireEye's FLARE On 2014 challenges that I recently attempted.
Cigma is a minimal, pure Python filetype identification library I created as an alternative to various Python ports of libmagic that are floating around.
This post introduces a pure-Python way of parsing a pcap file and generating statistics like capinfos tool from Wireshark.
This post is a writeup for the bin100 challenge (Dice Revenge) from Eindbazen CTF 2013.