Skip to content
Avatar
😎
😎

Achievements

Achievements

Highlights

  • Pro
Block or Report

Block or report EgeBalci

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
EgeBalci/README.md

Hi there 👋

I'm currently working in a Switzerland based cybersecurity company named PRODAFT. My main focus areas are malware analysis, threat intelligence and red team adversarial attack simulation. I often share my design and implementation of exploits and tools that can be used in red-team engagements and offensive threat intelligence operations.

📓 Blogs:

GitHub badge

Pinned

  1. amber Public

    Reflective PE packer.

    Go 778 173

  2. sgn Public

    Shikata ga nai (仕方がない) encoder ported into go with several improvements

    Go 700 111

  3. IAT_API Public

    Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.

    Assembly 56 17

  4. Hook_API Public

    Assembly block for hooking windows API functions.

    Assembly 58 11

  5. Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit

    Ruby 7 6

  6. Forked from rapid7/metasploit-framework

    Metasploit Framework

    Ruby 3

68 contributions in the last year

May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Mon Wed Fri

Contribution activity

May 2022

Created 4 commits in 1 repository
Created 1 repository

Seeing something unexpected? Take a look at the GitHub profile guide.