
Ebubekir
@hackerbecker
Malware Analyst @PRODAFT - @_aucc, Karidesler CTF player @[email protected]
You might like
🐌 Subtle Snail (UNC1549), an Iran-nexus espionage group 🇮🇷, is targeting European 🇪🇺 telecom, aerospace, and defense organizations. The group uses LinkedIn HR lures and Azure-based C2. Read the full report 👉 catalyst.prodaft.com/public/report/… #ThreatIntel #Malware #APT #IOC

🚨 BIG NEWS: THE SYS INITIATIVE 🚨 For years, cyber criminals have hidden in the shadows of forums. They operated behind fake names, encrypted channels, and closed communities. Reputation and trust were their most valuable currencies. Now is the time to shift from defense to…
Merhaba! Teknolojinin baş döndürücü hızla geliştiği günümüzde, siber güvenlik hepimizin gündeminde en üst sıralarda yer alıyor. 🤩 İşte tam bu yüzden, seni Siber Güvenlik Zirvesi 2025’e davet ediyoruz! 🚀 Bu etkinlikte: 💻 Alanında uzman konuşmacılardan en yeni siber tehdit…

Diferansiyel denklemler dersi almış mühendis bir tanıdığınız varsa , hayat boyu bu dersin anılarını dinleyeceksinizdir. Not: askerlik anılarıyla yarışır . xdxdxd
My first blog post, "Understanding the Process Environment Block (PEB) for Malware Analysis," is out! I've explained key PEB techniques and demonstrated them with examples from #StealC and #BlackMatter ransomware. metehan-bulut.medium.com/understanding-… #malware #ReverseEngineering #infosec
Since LOCKBIT’s first entry into the cybercrime ecosystem, we at PRODAFT have been assisting NCA, FBI and other partners of #OpCronos to better comprehend and disrupt this large criminal enterprise. Researching this ill-famous cybercrime syndicate has been challenging, but our…

a writeup for mobilehackinglab.com's "Damn Exploitable Android App" challenge. devilinside.me/blogs/android-…

Here, IDAPython script to count how many times a function has been called. High call count usually points to decryption functions in obfuscated malware. github.com/batcain/idapyt…

🚀 We keep adding more fuel to our growing Spotify channel! 🎵 🤭 Each of our teams has a unique music taste (to say at least) - something you can definitely see reflected in the diverse range of playlists we have curated for y’all. Let’s see... 👀 🤺 Lively songs that make…

Why pay the ransom if you can decrypt your files? 🤔 💸 🕵️♂️ Last month, the PTI team noticed an emergence of a new ransomware dubbed PlutoCrypt. PlutoCrypt is a customized version of an ill-known malware #CryptoJoker. 🃏 It has been observed that the ransomware is targeting banks…

radareorg/radare2 disclosed a bug reported by @echel0n_1881 (CVE-2023-1605) - Patch: github.com/radareorg/rada… huntr.dev/bounties/9dddc… #hunter #infosec #opensource

My latest project, Evasion Escaper! It's a powerful tool that bypasses checks made by the malware to detect if it's running in a sandbox. It includes innovative techniques for DLL tracking and new bypass methods. Check it out and share your feedback! vvelitkn.com/malware%20anal…
Keyword exclude ekledim, keyword listesini deprem ile alakalı kelimelerle güncelledim. Kullanmak isteyen olursa buraya bırakıyorum. github.com/batcain/phishi… Şimdiye kadar bulduğum ve daha sonra bulacağım alan adlarını da aşağıdaki repoya ekliyor olacağım. github.com/batcain/olta
github.com
GitHub - batcain/phishing_catcher: Phishing catcher using Certstream
Phishing catcher using Certstream. Contribute to batcain/phishing_catcher development by creating an account on GitHub.
Merhaba, ben x0rz'a ait phishing catcher aracını kullanıyorum. Araç domainlere yeni alınmış sertifika streamini vereceğiniz keywordlere ve tldlere göre filtreliyor. Ancak, exclude mekanizması bulunmuyor. Dolayısıyla epey noise yaratıyor ve manuel kontrol gerektiriyor.
Currently looking for remote mid malware analyst/hunter job alongside reverse engineering, just so you know. End of transmission.
One of the best malware analyst and reverse engineer I know
Currently looking for remote mid malware analyst/hunter job alongside reverse engineering, just so you know. End of transmission.
Today’s #OALABS AMA… Malware Analysis Tips and Tricks 🧨 — One Trick To Level Up Your Reverse Engineering youtu.be/EjVVbM6ub00 — How To Identify Unknown Crypto Functions youtu.be/BGIDMpSztSk — .NET Static Config Extractor Tips youtu.be/n435uL01T_E —

📢📢 2022-2023 dönemi için tanışma toplantımızı gerçekleştirdik 🎉🎊 Güncel sunuma buradan erişebilirsiniz: raw.githubusercontent.com/AUCyberClub/sl…



Hello guys! I created a helper #YARA module that gets the data at the given offset and size. Kudos to @_n1ghtw0lf for inspiring awesome blog post! Here is my blog post: devilinside.me/blogs/configur… You can find used samples and example usages in this repository:github.com/theatha/YARA_f…
. @tmpout'ın volume 1'inden tam 5 yazıyı Türkçe'ye tercüme eden @echel0n_1881 ve @batcain_, devamının da yolda olduğunu söyledi. Şuradan derginizi edinebilirsiniz: - tmpout.sh/1/tr/

United States Trends
- 1. No Kings 495K posts
- 2. Dork Cult Protest Day 7,488 posts
- 3. Ange 66.1K posts
- 4. #Talus_Labs N/A
- 5. Nuno 9,305 posts
- 6. Girona 20.1K posts
- 7. Chelsea 152K posts
- 8. Forest 138K posts
- 9. Good Saturday 35.8K posts
- 10. Gameday 31.2K posts
- 11. #Caturday 4,036 posts
- 12. #SaturdayVibes 4,727 posts
- 13. Emiru 16.5K posts
- 14. Massie 45.8K posts
- 15. Marinakis 7,647 posts
- 16. Witsel 4,062 posts
- 17. Pedri 28.7K posts
- 18. Ndiaye 4,664 posts
- 19. Savinho 3,459 posts
- 20. Reece James 18.1K posts
You might like
-
batcain
@batcain_ -
Furkan Öztürk
@furk4n0zturk -
Kağan IŞILDAK
@kaganisildak -
meto
@meto0x3d -
Eren
@aporlorxl23 -
Berk Albayrak
@brkalbyrk7 -
ty
@_theatha -
Murat Y
@divinepwner -
sh4d0wless
@sh4d0wlesss -
cyx
@cyx0d -
redjh0n
@redjh0nn -
𝚎𝚌𝚑𝚎𝚕𝚘𝚗
@echel0n_1881 -
ahmet kotan
@ahmetcode -
fatih
@fatihsnsy -
Utku Çorbacı
@rhotav
Something went wrong.
Something went wrong.