Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@EgeBalci
EgeBalci
Follow
View EgeBalci's full-sized avatar
😎

Ege Balcı EgeBalci

😎
Security Researcher

Highlights

  • Pro

Block or report EgeBalci

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

Report abuse
egebalci/README.md

I'm currently working for a Switzerland based cybersecurity company named PRODAFT. My main focus areas are reverse engineering, malware analysis, exploit development, threat intelligence, and red team adversarial attack simulation. I often share my design and implementation of exploits and tools that can be used in red-team engagements and offensive threat intelligence operations.

📓Blogs & Projects:

GitHub badgeGitHub badge

💻 Tech Stack:

GoRustC++CPHPMarkdownShell ScriptRubyPythonGoogle CloudAWSCloudflareDigitalOceanHerokuApacheNginxMariaDBMongoDBMySQLPostgresArduinoRaspberry PiElasticSearchDocker

PinnedLoading

  1. amberamberPublic

    Reflective PE packer.

    Go 1.3k 218

  2. sgnsgnPublic

    Shikata ga nai (仕方がない) encoder ported into go with several improvements

    Go 1.7k 229

  3. IAT_APIIAT_APIPublic

    Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.

    Assembly 75 15

  4. Hook_APIHook_APIPublic

    Assembly block for hooking windows API functions.

    Assembly 91 11

  5. deoptimizerdeoptimizerPublic

    Evasion by machine code de-optimization.

    Rust 389 26

  6. WSAAcceptBackdoorWSAAcceptBackdoorPublic

    Winsock accept() Backdoor Implant.

    C 115 23


[8]ページ先頭

©2009-2025 Movatter.jp