Skip to content
Avatar
😎
😎

Achievements

Achievements

Highlights

  • Pro
Block or Report

Block or report EgeBalci

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
EgeBalci/README.md

Hi there 👋

I'm currently working in a Switzerland based cybersecurity company named PRODAFT. My main focus areas are malware analysis, threat intelligence and red team adversarial attack simulation. I often share my design and implementation of exploits and tools that can be used in red-team engagements and offensive threat intelligence operations.

📓 Blogs:

GitHub badge

Pinned

  1. Reflective PE packer.

    Go 620 154

  2. Shikata ga nai (仕方がない) encoder ported into go with several improvements

    Go 463 73

  3. Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.

    Assembly 47 13

  4. Assembly block for hooking windows API functions.

    Assembly 37 6

  5. Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit

    Ruby 5 5

  6. Forked from rapid7/metasploit-framework

    Metasploit Framework

    Ruby 3

9,838 contributions in the last year

May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Mon Wed Fri

Contribution activity

May 2021

Created 362 commits in 2 repositories
Created 2 repositories

Seeing something unexpected? Take a look at the GitHub profile guide.