147 Followers
450 Following
32 Posts
Malware enthusiast. Security Researcher. Reverse Engineer. Exploit developper. Threat Intel @prodaft FPV drone pilot 🚁
Githubhttps://github.com/egebalci
Twitterhttps://twitter.com/egeblc
BlueSkyhttps://bsky.app/profile/ege.sh
Bloghttps://pentest.blog
Websitehttps://ege.sh
#flareon12 πŸ₯²
Finally finished #flareon11 πŸ₯² Lost a lot of time AND SANITY on question 9. Learned a lot and had fun as always.
I built myself a couple of #Meshtastic nodes 😊 I got up to 22km of range with a 443 MHz Heltec V3. Hit me up if you're near. Node names: FAP1, FAP2 (MQTT enabled).
Added to the collection πŸ₯° #flareon10
Oops πŸ˜†β€‹ #Lockbit
Some TAs are using Github issues to target repo owners with crypto scams. Github notification mails are guaranteed to reach your inbox, bypassing any spam filters and security products. The content of the scam is very basic, but I can give points for creativity for sure :)

QSocket v0.0.6-beta released πŸ”₯πŸŽŠπŸŽ‰
- New websocket based knock protocol
- QSRN moved behind Cloudflare CDN
- Multi session support
- Better traffic forwarding capabilities
- Terminal QR code generation on deploy

https://github.com/qsocket/qs-netcat

GitHub - qsocket/qs-netcat

Contribute to qsocket/qs-netcat development by creating an account on GitHub.

GitHub
Finished #flareon10 in 69th place this year. πŸŽ‰πŸŽ‰ It was definitely the hardest year. I had so much fun and agony at the same time. Next year's goal is to top 30.
I’ve realized that I’m having much more fun writing N-day exploits than doing vuln research. It takes MUCH LESS time and equally sharpens your skills, maybe even more. Writing N-days with just a brief CVE description is very much like solving a CTF challenge. If you can’t reproduce the bug, you simply need to do more reversing. At the end, the prize is guaranteed; you're not wasting your time. This could be a very good starting point for beginners. There are a lot of critical vulnerabilities being disclosed without a proper exploit.I was able to write 10+ RCE exploits last month just by following ZDI and CVE feeds. Ended up at No. 1 on the Metasploit contributions last month 😁