Welcome to my homepage!
I'm currently working as a cloud security researcher & advocate at Datadog. You will find below some pointers to posts and software I have written in the past.
Feel free to use my contact detail below to reach out!
Latest posts from my blog where I write about things I like, use, dislike and misuse.
- MitM at the Edge: Abusing Cloudflare Workers
- Introducing Stratus Red Team, an Adversary Emulation Tool for the Cloud
- Implementing a Vulnerable AWS DevOps Environment as a CloudGoat Scenario
- Cloud Security Breaches and Vulnerabilities: 2021 in Review
- Phishing for AWS credentials via AWS SSO device code authentication
Latest posts I wrote with current or past employers.
- Exploring GitHub-to-AWS keyless authentication flaws
- Attacking and securing cloud identities in managed Kubernetes part 1: Amazon EKS
- The OverlayFS vulnerability CVE-2023-0386: Overview, detection, and remediation
- Partially bypassing the AWS Console authentication rate limiting
- A retrospective on public cloud breaches of 2022
- Investigating a backdoored PyPi package targeting FastAPI applications
- Finding malicious PyPI packages through static code analysis: Meet GuardDog
- The OpenSSL punycode vulnerability (CVE-2022-3602), detailed write-up
- State of AWS Security in 2022: a look into 600+ real-world AWS environments
- Stratus Red Team
- Granular, Actionable Adversary Emulation for the Cloud
- Identify common security issues in managed Kubernetes environments.
- Find origins of websites behind by CloudFlare using Internet-wide scan data from Censys
- Automate the provisioning of Active Directory labs in Azure
- Vulnerable Spring Boot application for easy reproduction of the Log4shell vulnerability
- Go framework for end to end testing threat detection rules
- Subdomain enumeration using the certificate transparency logs from Censys
- Mindmaps for threat hunting using memory captures and Windows event logs
- Mind The Gap! Bringing Together Cloud Services and Managed K8s Environments (KubeCon EU 2023)
- Finding Malicious PyPI Packages in the Wild (Insomni'Hack 2023)
- Purple Teaming & Adversary Emulation in the Cloud (DEFCON Cloud Village 2022)
- Purple Teaming the Cloud with Stratus Red Team (Cloud-Native SecurityCon 2022)
- Fantastic AWS Hacks and Where to Find Them (SANS New2Cyber 2022)
- Scanning Infrastructure-as-Code for security flaws (OWASP DevSlop)
- Can't Take My Lab off You — Automating the Provisioning of Active Directory Labs in Azure (vOPCDE #7)
- Adaz presentation (Forensic Lunch October 23rd, 2020)
- Switzerland has bunkers, we have Vault (BlackAlps 2018)
- How hackers exploit weak SSH credentials to build DDoS botnets (Blackalps 2017, Grehack 2017)
Technical and non-technical books I particularly enjoyed reading and learning from.
- Hacking, the Art of Exploitation
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Violent Python
- The Phoenix Project
- The Goal: A Process of Ongoing Improvement
- Team Topologies
- Building Microservices: Designing Fine-Grained Systems
DevOps / Engineeering:
Quotes I find inspiring. Taken from a book, a movie, a reddit post, a blog post, or an overheard conversation.
- « Not every problem is a nail, and not every solution a hammer »
- « Under-promise, over-deliver »