Malware Analysis · Threat Intelligence
Reverse engineering
malware,
one sample at a time.
Independent malware analyst & computer engineering student. I dissect malicious software, document TTPs, and publish detailed technical reports. Currently studying Threat Intelligence and working toward a deeper understanding of adversary tradecraft.
I'm a computer engineering student with a strong focus on malware analysis and threat intelligence. Based in Turkey, I'm actively developing hands-on skills through self-directed research.
This site is where I publish my analysis work and detailed breakdowns of real malware samples, including behavioral analysis, IOC extraction, and MITRE ATT&CK mapping.
My goal is to learn in public, document my progress, and contribute useful intelligence back to the community.
- Malware Analysis & Reverse Engineering — Self-study
- MITRE ATT&CK Framework — Applied usage
- Threat Intelligence fundamentalsOK
- Flare-Learning-Hub Ongoing
- eLearnSecurity eMalware Analysis Planned
Commodity malware — Stealers, RATs, loaders, and ransomware that affect real users every day.
Threat actor TTPs — Understanding how adversaries operate beyond just the sample itself.
Have a sample to share, a collaboration idea, or just want to talk malware? Reach out.
Email: 0xblackrose@proton.me
Twitter: @LxlxIxlxlxL
Discord: @0xbl4ck