Skip to content
View phretor's full-sized avatar

Highlights

  • Pro

Block or report phretor

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
phretor/README.md

Welcome! 🏡

This is my humble GitHub Home 💻 where can find the repos I'm most active on.

I’m Federico Maggi, and my mission is to bridge complex security challenges with practical business strategy.

I'm a cybersecurity engineer, researcher, and advisor leading security for the latest hyperscale AI & infrastructure technology and platforms. I have hands-on experience in offensive and defensive security research on embedded systems, radio-frequency control systems, industrial robots, cars, and devices.

I help transform complex security engineering & research challenges into actionable business insights and guide the next generation of cybersecurity professionals.


I reviewed and tested the security design of hardware, firmware, and virtualization layers of flagship AI server platforms based on NVidia, Qualcomm, and Amazon silicon, and multi-rack edge computing infrastructures, supporting millions of customers worldwide.

I worked in cybersecurity engineering, research, and development throughout the stack: Intel/AMD/ARM server platforms, peripheral and embedded firmware, web applications, network protocols and devices, embedded protocols and systems for industrial applications, radio frequency control systems, ABB and Kuka industrial robots, cars and mobile devices (Android).

I built cloud-native firmware-signing pipelines to enable scalable secure-boot infrastructures, I built firmware-analysis and malware-scanning pipelines, threat-intel systems, mobile ransomware detection tools, fraud-detection systems, malware behavior mining algorithms, large-scale internet measurements studies, and anomaly detection tools.

I coach speakers who want to turn complex cybersecurity topics into clear, engaging, and memorable talks.

More

Latest Projects

  • 📡 RFQuack, the versatile RF-analysis tool that quacks!
  • 📶 Capture the Signal, an RF capture the flag framework!
  • Other projects can be shared under NDA

For more details, please visit https://trustial.org

Pinned Loading

  1. publications publications Public

    My publications

    TeX 2 1

  2. secdev/scapy secdev/scapy Public

    Scapy: the Python-based interactive packet manipulation program & library.

    Python 11.8k 2.2k

  3. google/oss-fuzz google/oss-fuzz Public

    OSS-Fuzz - continuous fuzzing for open source software.

    Shell 11.4k 2.5k

  4. rfquack/RFQuack rfquack/RFQuack Public

    RFQuack: the versatile RF-analysis tool that quacks!

    C++ 298 40

  5. infosec-opml infosec-opml Public

    My very personal and opinionatedly organized infosec/cybersec sources in one OPML file

    58 7

  6. intel-leak-checker intel-leak-checker Public

    Check if the trust of a ROM image may be affected by the recent Intel Alder Lake leak

    Shell 18 5