Cybersecurity professional specializing in Malware Analysis, Threat Intelligence and Threat Researching.
After graduating from Bahcelievler Erkan Avci Industrial Vocational High School, I earned admission to Yeditepe University's Management Information Systems program. I've been developing my skills in cybersecurity since the age of 15, beyond what was taught in formal education. I completed a 6-month internship at InfinitumIT, a cybersecurity consultancy company, during my late teens and early twenties.
Following my internship, I worked as a Cybersecurity Engineer at the same company, where I was responsible for installation, configuration, and management of open-source cybersecurity products for clients. Additionally, I took on roles in Cyber Threat Intelligence and Malware Analysis. After spending a year and a half at InfinitumIT, I moved to ThreatMon IT, where I began working as a Malware Analyst and Malware Intelligence specialist. I continue to work in the Malware R&D team since joining the company.
Expert in tracking and analyzing threats in the digital landscape.
Skilled in both static and dynamic malware analysis techniques.
Expert in implementation and management of open-source security solutions.
Developer of cybersecurity tools and custom solutions.
Working as a Malware Analyst and Threat Researcher at ThreatMon's Advanced Threat Intelligence Platform. Key responsibilities include:
Worked with open-source cybersecurity products and provided services to customers. Key responsibilities included:
Served as a Teaching Assistant for Atil Samancioglu's Ethical Hacker Attacks and Network Attacks courses. Responsibilities included:
One of the world's most widely used open-source phone number intelligence tools. Provides detailed information and analysis capabilities for phone numbers.
View on GitHub"Socialx" is a Social Engineering And Remote Access Trojan Tool. You can generate fud backdoor and you can embed any file you want inside of the exe file.
View on GitHubBeef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.
View on GitHubThis system allows you to add IOCs (Indicators of Compromise) to your MISP server manually or automatically. It includes 15 different services.
View DetailsThis is a Ghidra script that calls OPENAI to give meaning to decompiled functions, enhancing reverse engineering workflows.
View DetailsCEO of Academy Club
Blue Team Lead at InfinitumIT
ThreatMon Malware R&D Team Lead
ThreatMon Cyber Threat Intelligence Team Lead