Contact
e

Code Review

I provide white-box penetration testing and code review services to a limited number of clients each year. My goal is to identify vulnerabilities and logic flaws in the source code that could lead to current or future security issues. Beyond detection, I work closely with development teams to help remediate these issues effectively.

Malware Research

My work in malware research focuses on dissecting and understanding the inner workings of malicious software through reverse engineering. By analyzing their behavior, functionality, and impact, I document key findings that provide valuable insights into how these threats operate.

Penetration Testing

I offer penetration testing services (Black Box, Grey Box) to identify vulnerabilities by simulating real-world attacks on your digital infrastructure. I provide tailored training sessions and strategic security guidance helping them build long-term cybersecurity capabilities and make informed decisions.

Open-Source

I am actively involved in open-source projects related to InfoSec, with a particular focus on malware research. By contributing to and collaborating within the community, I help develop tools and techniques that enhance our understanding and defense against malicious software and evolving cyber threats.

These are professional services offered to a limited number of clients per year. Services not marked with this icon represent self-financed initiatives, completely free, ad-free, and developed independently on my free time. Feel free to contact me for further details or specific inquiries.

Projects


Publications


Search for Registry Keys / Values logo Search for Registry Keys / Values Malware Gallery Delphi June 12, 2025
Dump Process Memory via MiniDumpWriteDump logo Dump Process Memory via MiniDumpWriteDump Malware Gallery Delphi June 11, 2025
Dump Process Memory via ReadProcessMemory logo Dump Process Memory via ReadProcessMemory Malware Gallery Delphi June 9, 2025
Enumerate Local Process Modules via PEB logo Enumerate Local Process Modules via PEB Malware Gallery Delphi June 2, 2025
Enumerate Remote Process Modules via PEB logo Enumerate Remote Process Modules via PEB Malware Gallery Delphi June 2, 2025
Enumerate Process Modules via CreateToolhelp32Snapshot logo Enumerate Process Modules via CreateToolhelp32Snapshot Malware Gallery Delphi May 27, 2025
Search for Files via FindFirstFile / FindNextFile logo Search for Files via FindFirstFile / FindNextFile Malware Gallery Delphi May 23, 2025
Enumerate Files via FindFirstFile / FindNextFile logo Enumerate Files via FindFirstFile / FindNextFile Malware Gallery Delphi May 23, 2025
Enumerate Remote Shares via WNetEnumResource logo Enumerate Remote Shares via WNetEnumResource Malware Gallery Delphi May 13, 2025
Enumerate Local Shares via NetShareEnum logo Enumerate Local Shares via NetShareEnum Malware Gallery Delphi May 9, 2025

whoami

Jean-Pierre LESUEUR

  • Founder
  • Developer
  • Security and Malware Researcher

With over 20 years of experience in Information Technology, I am a seasoned Security Researcher, Penetration Tester and Malware Researcher/Reverse Engineer. My expertise extends to development, proficient in languages such as C#, Python, Go, Delphi, and ASM x86. In 2014, I founded PHROZEN, a venture dedicated to creating innovative cybersecurity solutions. My commitment lies in safeguarding our digital future, continuously advancing in knowledge and developing cutting-edge security measures.

France / Maisons Laffitte (78600)
jplesueur@phrozen.io

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3Qtg
-----END PGP PUBLIC KEY BLOCK-----
Download Public Key

Certifications I Challenges