Skip to content
View EgeBalci's full-sized avatar
😎
😎

Highlights

  • Pro

Block or report EgeBalci

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
EgeBalci/README.md

Hi there 👋

I'm currently working for a Switzerland based cybersecurity company named PRODAFT. My main focus areas are reverse engineering, malware analysis, exploit development, threat intelligence, and red team adversarial attack simulation. I often share my design and implementation of exploits and tools that can be used in red-team engagements and offensive threat intelligence operations.

📓 Blogs & Projects:

GitHub badge GitHub badge

💻 Tech Stack:

Go Rust C++ C PHP Markdown Shell Script Ruby Python Google Cloud AWS Cloudflare DigitalOcean Heroku Apache Nginx MariaDB MongoDB MySQL Postgres Arduino Raspberry Pi ElasticSearch Docker

Pinned Loading

  1. amber amber Public

    Reflective PE packer.

    Go 1.2k 207

  2. sgn sgn Public

    Shikata ga nai (仕方がない) encoder ported into go with several improvements

    Go 1.5k 210

  3. IAT_API IAT_API Public

    Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.

    Assembly 68 15

  4. Hook_API Hook_API Public

    Assembly block for hooking windows API functions.

    Assembly 81 11

  5. CVE-2018-8065 CVE-2018-8065 Public

    Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit

    Ruby 5 7

  6. metasploit-framework metasploit-framework Public

    Forked from rapid7/metasploit-framework

    Metasploit Framework

    Ruby 4 1