You can reach me at ping2A (at) 42 (dot) bzh
I spent my last decade at Google in the Android Security Team, to fight against Android malware !
I'm now working at CERT-EDF, to keep the light on ;)
Public projects
Open source work across Androguard, IsMyPhonePwned, and personal repos.
Androguard
- androguard β Python toolkit for reverse engineering, static analysis and pentesting of Android apps (APK, DEX, resources).
- goauld β Dynamic code injection into Linux/Android processes via
/proc/pid/mem; no ptrace, Rust.
- dex-parser β Low-level DEX parser in Rust; the scalpel for Dalvik executables.
- dex-bytecode β DEX bytecode disassembler and assembler in Rust; works with dex-parser.
- dex-decompiler β DEX to high-level code decompiler in Rust; builds on dex-parser and dex-bytecode.
- axml-parser / axml β Parse Android binary XML (manifest, resources); Rust parser and Python bindings.
- apk-parser β Parse APK metadata and contents in Python without full unpacking.
- yara-droid β Small, fast Yara-X-style rule matching for Android/DEX artifacts (Rust, GPL-3).
- freedump β Dump process memory on Android/Linux using Frida; useful for forensics and analysis.
IsMyPhonePwned
- mimic β Rust library to detect files crafted to exploit parsing CVEs (DNG/RTF/TTF/RAR/PDF). Analysis runs in-browser; nothing uploaded.
- bugreport-extractor-library β Rust library to read and extract structured data from Android bug reports for pwned-check and analysis.
- webadb-rs β Run ADB commands from the browser via WebUSB; powers the IsMyPhonePwned bugreport flow.
ping2A (personal)
- CanIGoIn β Security Chrome extension for clickfix and safe-browsing fun.
- sigmazero β Evaluate Sigma detection rules in pure Rust; no Python runtime.
- IronSift β βWhereβs Waldo?β style security and analysis tool (Rust).
- BadUSBPy β BadUSB-style device emulation and scripting in Python.
- anomark-rs β Anomark (Android app signing / anomaly detection) reimplemented in Rust with a bit of AI.
EDF
- dumpstate-py β Pure Python package to extract useful structures from Android Bug Reports for forensics (battery, packages, processes, power, sockets, etc.). I maintain a fork.
- rusty-magpie β Android artifacts collector and Yara-X scanner in Rust; collects processes and file lists on-device and runs Yara rules directly on the phone.
Papers & talks
- DroidKaigi Tokyo 2023 β Securing Android Applications: The not so secret guide explained
- DroidCon San Francisco 2023 β Securing Android Applications: The not so secret guide explained
- Google Security Blog 2017 β Tizi: Detecting and blocking socially engineered spyware on Android
- Pacsec Japan 2012 β New "open source" step in Android Application Analysis
- Phrack 68 2012 β Similarities for Fun and Profit
- HICSS 2012 β Android: Static Analysis Using Similarity Distance
- Blackhat Abu Dhabi 2011 β Android: from reversing to decompilation
- Computer Security Congress 2011 β Analyzing Android Applications
- EICAR 2011 β Android Malwares: is it a dream?
- Hack.lu 2010 β Dynamic, Metamorphic (and open source) Virtual Machines
- RSSIL 2010 β Questions autour des antivirus
- ECIW 2010 β Forensic and Software (un)Obfuscation
- ECIW 2010 β BinThavro: towards a useful and fast tool for Goodware and Malware Analysis
- iAWACS 2010 β Processor-Dependant Malware ... and codes
- Hack.lu 2009 β Implementation of K-ary Viruses in python
- Hack.lu 2009 β iAWACS 2009 Debrief
- EICAR 2009 β Detecting (and creating!) of an HVM rootkit (aka Bluepill-like)
- EICAR 2009 β Memory Live Forensics
- SSTIC 2008 β ERESI: Une plate-forme d'analyse binaire au niveau noyau