Skip to content
View ElNiak's full-sized avatar
:shipit:
Focusing
:shipit:
Focusing

Highlights

  • Pro

Organizations

@csvl

Block or report ElNiak

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ElNiak/README.md

Hey there 👋, I'm ElNiak

linkedin buy-me-a-coffee medium

Glad to see you here!

I’m a cybersecurity researcher and teaching assistant at UCLouvain. Being a researcher allows me to not only develop autonomy and knowledge but also develop two tools improving security and analysis.

I have a computer science master degree (155 ECTS) in:

  • software engineering,

  • software & network security (mainly for transport and application layers)

  • and AI (basic knowledge - ML/DL).

I love designing systems that are light yet powerful, not over engineered, distributed yet synchronized and beautiful yet effective.


More about me

Readme Card

Readme Card

Readme Card

Readme Card

Readme Card

Readme Card

Readme Card

Readme Card

Readme Card

Readme Card

Readme Card

Readme Card

  • 🌱 I’m currently learning Ivy used for formal verification, angr for malware analysis and many other techs. All of my application use Docker for better deployment across the world.

  • 💬 Ask me about formal verification and code analysis!

  • ⚡ Fun fact: There is no fun! Just writing code and drinking coffee 24/7 only 😎👌


Research

  • Rousseaux, T., Crochet, C., Aoga, J., Legay, A. (2024). Network Simulator-Centric Compositional Testing. In: Castiglioni, V., Francalanza, A. (eds) Formal Techniques for Distributed Objects, Components, and Systems. FORTE 2024. Lecture Notes in Computer Science, vol 14678. Springer, Cham. https://doi.org/10.1007/978-3-031-62645-6_10

  • S Lucca, C Crochet, CHB Van Ouytsel, A Legay (2023). On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr. FPS2023

  • CH Bertrand Van Ouytsel, C Crochet, KHT Dam, A Legay (2022). Tool paper-sema: Symbolic execution toolchain for malware analysis. International Conference on Risks and Security of Internet and Systems, 62-68

  • Crochet, C., Rousseaux, T., Piraux, M., Sambon, J.-F., & Legay, A. (2021). Verifying quic implementations using ivy. In Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC. DOI

  • Crochet, C., & Sambon, J.-F. (2021). Towards verification of QUIC and its extensions. (Master's thesis, UCL - Ecole polytechnique de Louvain). Available at UCLouvain. Keywords: QUIC, Formal Verification, RFC, IETF, Specification, Ivy, Network.

Languages and Tools

React Bootstrap CSS3 HTML5 JavaScript C++ C AWS Docker PHP MySQL MongoDB Python Nginx Express.js Bash Raspberry Pi Elastic Search Flask Linux Sass Jenkins Git Firebase Arduino Node.js Scala Android LaTeX Java Azure

Github Stats




Profile views counter


Generated using Github Profilinator

Pinned Loading

  1. csvl/SEMA csvl/SEMA Public

    SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (…

    Python 96 20

  2. PANTHER PANTHER Public

    This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy formal verification tool to check time properties. Furthermo…

    Python 28 3

  3. cupp-rs cupp-rs Public

    Common User Passwords Profiler (CUPP) in Rust

    Rust 23

  4. PySSH3 PySSH3 Public

    Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for more information !

    Python 12

  5. BountyDrive BountyDrive Public

    Forked from j1t3sh/SQL-Injection-Finder

    BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for performing attacks (google dorking, sqli, xss), reporting, and …

    Python 12 1

  6. PANTHER-Ivy PANTHER-Ivy Public

    Forked from kenmcmil/ivy

    IVy is a research tool intended to allow interactive development of protocols and their proofs of correctness and to provide a platform for developing and experimenting with automated proof techniq…

    C++ 7 1