An erie morning! Prince's Street Park in Edinburgh at Christmas Malamutes at the Beach Main Server Room - Fibre Stealth Handler and Reverse Shell written in C Screw on a Table Graphics Card PCB Breadboard

ZEPHER ASHE

MORE ABOUT ME

About Me

Hi there! I'm Zepher Ashe. I specialise in cybersecurity and malware analysis. Experienced with cybersecurity, network engineering, system administration and web technologies. Subsequently, versed in multiple operating systems (Linux, macOS, Windows, Android, iOS, Cisco IOS), programming languages (BASH, HTML5, CSS, PHP, MySQL, Java, Python, C). Acquainted with deploying public-key infrastructures (PKIs), cloud solutions with E2EE and Wi-Fi attack vectors. I have a strong background in digital security.

I graduated from the Open University with a BSc (Hons) in Computing and IT and have continued spending time learning new technologies. Since graduating learning has varied from reading articles and blogs around cybersecurity, engaging in communities , taking online courses and developing personal projects.

TECHNICAL SKILLS

My proficiency in each skill (drag to scroll)

Lowest possible value: 10% - Used for short period of time such as with a class project.

Highest possible value: 100% - Very extensive experience with this particular skill.


TIMELINE

  • September 2016 - September 2020

    Open University

    Studied Computing & IT

  • Janurary 2021

    Graduated University

    BSc (Hons) Computing & IT

  • July 2021 - May 2022

    Independent Projects/Study

    Malware analysis/development, web development

Projects and Relevant Experience

Here are some examples of projects I have produced.

Malware Analysis and Development

PythonRAT

    Command and Control (C2) server which can control multiple machines running the Remote Administration Trojan (RAT) forming a botnet cluster

  • Some Features Include:
  • Integrated keylogger written as a class
  • Check privilege level (Administrator/User)
  • Spawn other programs
  • Issue a sendall command to every active session
  • C2 and session manuals via help command

View Source Code at GitHub!

C Keylogger

    Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)

  • Features:
  • bzero implementation for Windows
  • Reuse of variable via references (lightweight)
  • Stealth handler (hides Command Prompt window)

See the Source Code Here

Web Design & Other

Ever since I challenged myself to create a social media website similar to Facebook as a way of learning HTML, CSS, JavaScript, PHP, MySQL, etc... I have been intrigued by web technologies from a creativity and hacking perspective. Here are some of the projects I worked on both in and outside of my studies.

Valhalla2

Valhalla2 is a full scale social media website! Not only does it contain all the main functionality you get with the likes of Facebook or Twitter, but it also respects privacy!

Hardened using PBKDF2 and each user having a unique salt.

Twitter Clone

TwitterClone is clone of the social media website Twitter written with Node.JS, MongoDB and Socket.IO.

Features • Tweets • Likes, comments, and retweets • Profile pages • Following and followers • Instant Messaging in real-time • Group chat support* • Profile pictures • Cover photos

Doogle

Doogle is a search engine and web crawler which can search indexed websites and image, and then using keywords be searched later.

MonoBlockchain

MonoBlockchain discover the engineering ideas behind blockchain technology and build a blockchain-based cryptocurrency network.

safesploitCloud

safesploitCloud is an end-to-end encrypted file hosting service offering a cloud sync client available on many platforms (Windows, macOS, Linux, Android and iOS) and web portal version. The web application uses NextCloud which is an open-source 'suite of client-server software for creating and using file hosting services'.

LondonRailway Network PKT

London Railways network Packet Tracer.

Work In Progress. Coming Soon!

Like what you see?

I'd love to hear from you!

GET IN TOUCH!
GPG: Secure Communication

© safesploit.com 2022. All rights reserved.