Skip to content
Avatar
😎
😎

Highlights

  • Arctic Code Vault Contributor
  • Pro
EgeBalci/README.md

Hi there 👋

I'm currently working in a Switzerland based cybersecurity company named PRODAFT. My main focus areas are malware analysis, threat intelligence and red team adversarial attack simulation. I often share my design and implementation of exploits and tools that can be used in red-team engagements and offensive threat intelligence operations.

📓 Blogs:

GitHub badge

Pinned

  1. Reflective PE packer.

    Go 471 133

  2. Shikata ga nai (仕方がない) encoder ported into go with several improvements

    Go 352 61

  3. Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.

    Assembly 30 11

  4. Assembly block for hooking windows API functions.

    Assembly 29 4

  5. Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit

    Ruby 5 5

  6. Forked from rapid7/metasploit-framework

    Metasploit Framework

    Ruby 3

196 contributions in the last year

Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Mon Wed Fri

Contribution activity

November 2020

Created 1 repository

Seeing something unexpected? Take a look at the GitHub profile guide.

You can’t perform that action at this time.