Fuad Aliyev Reverse Engineer & Malware Analyst ================================== CONTACT ----------------- - Website: https://endureeyes.xyz - Email: endureeyes@disroot.org - LinkedIn: https://www.linkedin.com/in/fuad-aliyev-3374b7333 - GitHub: https://github.com/basicacc ABOUT ME ----------------- A highly motivated and adaptable security researcher with a strong foundation in reverse engineering and malware analysis. Passionate about dissecting complex threats, developing custom security tools, and continuously learning in the ever-evolving landscape of cybersecurity. Thrives on the challenge of exploring the hidden corners of the digital world, one byte at a time. EXPERIENCE ----------------- Independent Malware Researcher | EndureEyes (Personal Project) | 2023 - Present - Conducted in-depth analysis of various malware families, focusing on packing techniques, C2 communication protocols, and payload functionality. - Documented findings in detailed reports and developed proof-of-concept tools for analysis automation. EDUCATION ----------------- Bachelor of Information Security | Baku Higher Oil School | 2023 - 2028 (Expected) SKILLS ----------------- **Reverse Engineering & Malware Analysis** - Static & Dynamic Analysis (IDA Pro, Ghidra, x64dbg) - Memory Forensics (Volatility) - Unpacking and Deobfuscation Techniques - Analysis of Trojans, Ransomware, and APTs **Programming & Scripting** - Python (for tooling, automation, and data analysis) - C/C++ (for understanding low-level code) - x86/x64 Assembly - PowerShell for system administration and scripting **Security Operations & Research** - Network Forensics (Wireshark) - Vulnerability Research - Threat Intelligence Gathering & Analysis - Tool Development for Security Automation ACHIEVEMENTS ----------------- - 2nd Place, Republican Informatics Olympiad (RFO) | 2023 - Achieved second place in the national informatics competition in Azerbaijan. - 2nd Place, Hackday CTF 2024 Qualifiers - As team BHOSWARE, secured second place in the qualifications. Unable to attend the final round in Paris due to sponsorship issues. - 87th Place, HTB Industrial CTF - Competed as part of team CyberElite Warrior, focusing on and solving reverse engineering challenges. - Active CTF Player - Regularly participate in various other Capture The Flag competitions to continuously sharpen skills.