ege's Avatar

ege

@ege.sh.bsky.social

Malware enthusiast. Security Researcher. Reverse Engineer. Exploit developper. Threat Intel @PRODAFT FPV drone pilot ๐Ÿš https://twitter.com/egeblc https://ege.sh @ege@infosec.exchange

151 Followers  |  192 Following  |  28 Posts  |  Joined: 04.07.2023  |  1.5337

Latest posts by ege.sh on Bluesky

Post image

#flareon12 ๐Ÿฅฒ

06.10.2025 22:25 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail
08.07.2025 16:09 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
GitHub - EgeBalci/evilreplay: Seamless remote browser session control Seamless remote browser session control. Contribute to EgeBalci/evilreplay development by creating an account on GitHub.

As a fun little weekend project, I have weaponized OpenReplay for exploiting XSS on "HttpOnly" websites. It allows you to remotely control a victim's browser without the need for stealing any cookies.

github.com/EgeBalci/evi...

08.07.2025 16:07 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Heading to London next week for Infosecurity Europe (3-5 June). If you're around and fancy grabbing a coffee or a beer after the exhibit, hit me up.

26.05.2025 12:04 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
GitHub - EgeBalci/go at release-branch.go1.24-opsec The Go programming language. Contribute to EgeBalci/go development by creating an account on GitHub.

Wrote a linker patch for mangling pclntab and removing build info from Golang binaries ๐Ÿ™ƒ

github.com/EgeBalci/go/...

23.05.2025 15:33 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

An unidentified individual has leaked the internal chats of the BlackBasta ransomware group

x.com/PRODAFT/stat...

20.02.2025 16:11 โ€” ๐Ÿ‘ 14    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Finally finished #flareon11 ๐Ÿฅฒ Lost a lot of time AND SANITY on question 9. Learned a lot and had fun as always.

15.10.2024 16:23 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
.:: Phrack Magazine ::. Phrack staff website.

Phrack #71 is ONLINE! ๐Ÿ”ฅ๐Ÿ”ฅ
This is literally a dream come true. My article โ€œEvasion by De-Optimizationโ€ got accepted into PHRACK 71! It is such an honor to be considered. I still canโ€™t wrap my head around the fact that my work has been published among the legends.

phrack.org/issues/71/1....

20.08.2024 09:13 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
GitHub - EgeBalci/deoptimizer: Evasion by machine code de-optimization. Evasion by machine code de-optimization. Contribute to EgeBalci/deoptimizer development by creating an account on GitHub.

The new version is out ๐ŸŽ‰ Version v0.1.2 is capable of simple control flow tracing. Now, it can find possible code paths and automatically skip dead offsets.
github.com/EgeBalci/deo...

23.07.2024 12:10 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image

I built myself a couple of #Meshtastic nodes ๐Ÿ˜Š I got up to 22km of range with a 443 MHz Heltec V3. Hit me up if you're near. Node names: FAP1, FAP2 (MQTT enabled).

06.07.2024 14:58 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Added to the collection ๐Ÿฅฐ #flareon10

03.07.2024 10:30 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
GitHub - EgeBalci/deoptimizer: Machine code de-optimizer. Machine code de-optimizer. . Contribute to EgeBalci/deoptimizer development by creating an account on GitHub.

New tool drop! ๐Ÿ”ฅ๐Ÿ”ฅ de-optimizer uses several mathematical approaches for mutating machine code instructions to their functional equivalents. Very good for bypassing rule-based detection without using any RWE memory. github.com/EgeBalci/deo...

01.07.2024 08:51 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Talks 2024 - Insomni'hack

Attention to all AV evasion enthusiasts! ๐Ÿšจ๐Ÿšจ I'll be talking about how to bypass security products by de-optimizing x86 binaries at Insomni'hack. See you all at Lausanne ๐Ÿ‘‹ #INSO24 www.insomnihack.ch/talks-2024/?...

21.03.2024 12:35 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Oops ๐Ÿ˜† #Lockbit

20.02.2024 13:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Release v2.0.1 ยท EgeBalci/sgn WarningDue to some difficulties of compiling keystone library, only Linux (amd64) binary is statically linked. Other release binaries still require keystone dynamic libraries on the system. Cha...

SGN v2.0.1 is out! ๐Ÿ”ฅ๐ŸŽŠ๐ŸŽ‰ Here are the changelogs:
- Register value preserving (-safe option) related bug fixes
- Random register selection bug fixed
- Better argument parsing
- Major code refactoring

github.com/EgeBalci/sgn...

19.12.2023 18:15 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Some TAs are using Github issues to target repo owners with crypto scams. Github notification mails are guaranteed to reach your inbox, bypassing any spam filters and security products. The content of the scam is very basic, but I can give points for creativity for sure :)

16.11.2023 12:02 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
GitHub - qsocket/qs-netcat Contribute to qsocket/qs-netcat development by creating an account on GitHub.

QSocket v0.0.6-beta released ๐Ÿ”ฅ๐ŸŽŠ๐ŸŽ‰
- New websocket based knock protocol
- QSRN moved behind Cloudflare CDN
- Multi session support
- Better traffic forwarding capabilities
- Terminal QR code generation on deploy

github.com/qsocket/qs-n...

12.11.2023 18:19 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Finished #flareon10 in 69th place this year. ๐ŸŽ‰๐ŸŽ‰ It was definitely the hardest year. I had so much fun and agony at the same time. Next year's goal is to top 30.

20.10.2023 10:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

Dibs on CVE-2023-32560 ๐Ÿ”ฅ I have added the Ivanti Avalanche MDM buffer overflow (DEP bypass) exploit this week. ๐ŸŽ‰๐ŸŽ‰ I'll take a break from writing N-days until the end of Flareon. www.rapid7.com/blog/post/20...

22.09.2023 18:29 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

Added two more ZDI exploits this week ๐ŸŽ‰๐ŸŽ‰ VMware vRealize Log Insight RCE module was very interesting, it chains together tree vulnerabilities for code execution.
www.rapid7.com/blog/post/20...

15.09.2023 20:05 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Sandbox Escape in vm2@3.9.19 via custom inspect function Sandbox Escape in vm2@3.9.19 via custom inspect function - vm2_3.9.19_sandbox_escape_2.md

I was reading the PoC for the CVE-2023-37903 NodeJS sandbox escape, and I remembered that box-js was also using vm2 for emulation. Escape is looking very easy; I suggest you don't use emulation on analysis until the update. ยฏ\_(ใƒ„)_/ยฏ gist.github.com/leesh3288/e4...

10.09.2023 11:25 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

I was able to write 10+ RCE exploits last month just by following ZDI and CVE feeds. Ended up at No. 1 on the Metasploit contributions last month ๐Ÿ˜

08.09.2023 20:17 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

If you canโ€™t reproduce the bug, you simply need to do more reversing. At the end, the prize is guaranteed; you're not wasting your time. This could be a very good starting point for beginners. There are a lot of critical vulnerabilities being disclosed without a proper exploit.

08.09.2023 20:17 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Iโ€™ve realized that Iโ€™m having much more fun writing N-day exploits than doing vuln research. It takes MUCH LESS time and equally sharpens your skills, maybe even more. Writing N-days with just a brief CVE description is very much like solving a CTF challenge.

08.09.2023 20:16 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

Added another ZDI exploit this week, more on the way ๐ŸŽ‰ www.rapid7.com/blog/post/20...

01.09.2023 16:38 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Ivanti Avalance making a lot of hackers happy nowadays ๐Ÿ˜

26.08.2023 16:24 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

+2 this week. Lets goo! ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ
https://www.rapid7.com/blog/post/2023/08/18/metasploit-weekly-wrap-up-23/

18.08.2023 19:46 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

It's that time of the year again :(

12.08.2023 22:24 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Metasploit Weekly Wrap-Up | Rapid7 Blog

use exploits/multi/http/rudder_server_sqli_rce ๐ŸŽ‰๐ŸŽ‰

https://www.rapid7.com/blog/post/2023/08/04/metasploit-weekly-wrap-up-22/

05.08.2023 08:19 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@ege.sh is following 20 prominent accounts