Skip to content
Avatar
😎
😎

Highlights

  • Arctic Code Vault Contributor
  • Pro
EgeBalci/README.md

Hi there 👋

I'm currently working in a Switzerland based cybersecurity company named PRODAFT. My main focus areas are malware analysis, threat intelligence and red team adversarial attack simulation. I often share my design and implementation of exploits and tools that can be used in red-team engagements and offensive threat intelligence operations.

📓 Blogs:

GitHub badge

Pinned

  1. Reflective PE packer.

    Assembly 423 125

  2. Shikata ga nai (仕方がない) encoder ported into go with several improvements

    Go 330 58

  3. Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.

    Assembly 22 9

  4. Assembly block for hooking windows API functions.

    Assembly 29 3

  5. Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit

    Ruby 5 5

  6. Forked from rapid7/metasploit-framework

    Metasploit Framework

    Ruby 3

181 contributions in the last year

Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Mon Wed Fri

Contribution activity

November 1, 2020

EgeBalci has no activity yet for this period.

October 2020

Seeing something unexpected? Take a look at the GitHub profile guide.

You can’t perform that action at this time.