Skip to content
View pedramamini's full-sized avatar
👋
👋

Organizations

@OpenRCE @InQuest

Block or report pedramamini

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
pedramamini/README.md

Biography

Pedram currently serves as the Chief Scientist at OPSWAT (https://www.opswat.com), dedicating his expertise to advancing machine learning, threat intelligence, and spearheading R&D innovation across diverse security solutions. In 2024, OPSWAT acquired InQuest (https://www.inquest.net), where Pedram was the CTO of a pioneering startup committed to safeguarding DoD users globally. At InQuest, he developed two flagship technologies: Deep File Inspection (DFI) for real-time threat detection, and "RetroHunting," a revolutionary method that applies today's threat intelligence to past data. InQuest is renowned for its large-scale malware analysis, and you can explore our research and continuously updated data at our open research portal, launched at Blackhat 2019: https://labs.inquest.net.

Pedram also holds advisory roles at Mozilla for their GenAI Bug Bounty program 0Din.ai, Exodus Intelligence (https://exodusintel.com), and AttackIQ (https://attackiq.com). Beyond his professional achievements, he is an angel investor, Austin business owner (https://sanjacsaloon.com), and a Jiu-Jitsu aficionado.

Pedram holds a computer science degree from Tulane University with minors in business, robotics, and mathematics. He began his professional career in 2002 as one of the founding members of iDEFENSE Labs, a security start-up in the Washington DC metro area which was acquired by Verisign in 2005. At iDEFENSE he architected and managed the Vulnerability Contributor Program (VCP) which consisted of a network of over 1,000 independent security researchers worldwide.

In 2005 Pedram moved to Austin, Texas to create the Zero Day Initiative (ZDI, https://www.zerodayinitiative.com) under the network security company TippingPoint. Similar to the VCP, the ZDI is a program for rewarding independent researchers for responsibly disclosing security vulnerabilities. This program has grown to be the largest and most successful of its kind. In the 5 years that Pedram ran the program, it unearthed and helped patch over 1,100 critical security flaws with contributions from over 1,600 researchers worldwide... that trend continues today. TippingPoint was acquired by 3Com and later Hewlett-Packard.

After the HP acquisition in 2010, Pedram founded and developed Jumpshot (archived website, Kickstarter launch), a consumer product for out-of-band malware removal. A unique software solution, Jumpshot differed from typical malware removal products in that the potentially infected computer is actually turned off. Jumpshot then took control of the system hardware and cleaned viruses and other undesirables from a forensic viewpoint with crowd-driven support from the cloud. A portion of the system was granted US patent #8812832. Jumpshot was unveiled from stealth mode in July of 2012 on the crowdfunding site Kickstarter. Soon after releasing the software to the general public, driven by excellent reviews on the efficacy of the product, Jumpshot was acquired by Avast. In September of 2013 Jumpshot was re-branded as GrimeFighter. (Please note, this is not the infamous data sciences firm Jumpshot.)

Pedram authored "Fuzzing: Brute Force Vulnerability Discovery", has presented at BlackHat, DefCon, RECon, Ekoparty, Microsoft Bluehat, ShmooCon, ToorCon and Virus Bulletin, and taught numerous sold out reverse engineering courses. His most recent in-person presentation was at Blackhat USA 2019:

Worm Charming: Harvesting Malware Lures for Fun and Profit

Recent blogs (@InQuest):

Publications and Citations

Fuzzing: Brute Force Vulnerability Discovery

Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system

OpenRCE: Open Reverse Code Engineering Community

Citations

Code

Digging Deeper

For an older talk but of particular interest to the vulnerability and exploitation markets and history, see his presentation from EkoParty Buenos Aires 2009 titled "Mostrame la guita! Adventures in buying vulnerabilities":

If you want to take a gander at a much younger albeit fatter Pedram, he's archived here unveiling the Paimei reverse engineering framework at the first RECON conference in Montreal.

Pinned Loading

  1. obsidian-obsessions obsidian-obsessions Public

    Forked from austininfosecfounders/obsidian-obsessions

    Collection of scripts, patterns, tips, notes, etc for Obsidian.md users

    Python

  2. Malware-Analysis-Training Malware-Analysis-Training Public

    Forked from OpenRCE/Malware-Analysis-Training

    Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.

    HTML 1 1

  3. paimei paimei Public

    Forked from OpenRCE/paimei

    A reverse engineering framework written in Python that I developed but no longer maintain.

    Python 16 5

  4. sulley sulley Public

    Forked from OpenRCE/sulley

    A pure-python fully automated and unattended fuzzing framework which I wrote but no longer maintain.

    Python 5 1

  5. lazy-cd lazy-cd Public

    Path bookmarking for bash. I use this extensively throughout my day.

    Shell 22 1