-
š Iām currently working on reversing quickheal ransomware tool
-
š± Iām currently learning (struggling ;D) Competitive Programming and DSA
-
ā Ask me about anything related to malware and low level architecture š±
-
ā” Just remember, every dead body on Everest was once an extremely motivated person.
- Played CTFs with warlock_rootx previously number 1 ranked ctf team in India
- Collaborate with like-minded researchers and experts and worked on crowd-sourced threat detection techniques. ā¢ Identify shortcomings in existing detection approaches and develop ideas to leverage current crowd-sourced detection techniques
ā¢ Worked on a malicious document library known as R4PTOR along with the team using the API key backed up by InQuest Labs, Virginia ā¢ Worked on a threat actor attribution library known as HAWK BASE which consists of open source available malware samples of different APT groups with attribution cards. ā¢ Learned different methods of malware triage and reverse engineering techniques from team members and community ā¢ Wrote community paper on malicious document analysis with YARA rules
Emotet Kimsuky APT(North Korea) Lazarus APT(North Korea) SideWinder APT(India) Ryuk Ransomware FINZ Hive Ransomware(Golang Variant) Symbiote(Currently Analyzing)