◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
⬡
ᛏ
1
ᚱ
ᚷ
◉
ᛋ
0
ᚠ
ᚦ
ᛁ
ᚠ
ᚱ
ᚦ
ᚷ
ᛁ
◉
◉
◉
◉
⬡
⬡
0x00000000 0xDEADBEEF 0x0000029A
0xBAADF00D 0x8BADF00D 0x0666 0000
ᚠ HOME ᚱ DISPATCH ᚦ ARSENAL ᚷ DOSSIER ᛁ GENESIS
Toggle theme
DOSSIER FUAD ALIYEV REVERSE ENGINEER & MALWARE ANALYST
DOWNLOAD◉
0x001
A highly motivated and adaptable security researcher with a strong foundation in reverse engineering and malware analysis. Passionate about dissecting complex threats, developing custom security tools, and continuously learning in the ever-evolving landscape of cybersecurity. Thrives on the challenge of exploring the hidden corners of the digital world, one byte at a time.
0x002
Independent Malware Researcher
EndureEyes (Personal Project) 2023 - Present
Conducted in-depth analysis of various malware families, focusing on packing techniques, C2 communication protocols, and payload functionality. Documented findings in detailed reports and developed proof-of-concept tools for analysis automation.
0x003
Bachelor of Information Security
Baku Higher Oil School 2023 - 2028 (Expected)
0x004
▸ Static & Dynamic Analysis (IDA Pro, Ghidra, x64dbg)
▸ Memory Forensics (Volatility)
▸ Unpacking and Deobfuscation Techniques
▸ Analysis of Trojans, Ransomware, and APTs
▸ Python (for tooling, automation, and data analysis)
▸ C/C++ (for understanding low-level code)
▸ x86/x64 Assembly
▸ PowerShell for system administration and scripting
▸ Network Forensics (Wireshark)
▸ Vulnerability Research
▸ Threat Intelligence Gathering & Analysis
▸ Tool Development for Security Automation
0x005
2nd Place, Republican Informatics Olympiad (RFO) Achieved second place in the national informatics competition in Azerbaijan, 2023.
2nd Place, Hackday CTF 2024 Qualifiers As team BHOSWARE, secured second place in the qualifications. Unable to attend the final round in Paris due to sponsorship issues.
5th Place, CIDC 2025 As team BHOSWARE, secured fifth place in the finals.
87th Place, HTB Industrial CTF Competed as part of team CyberElite Warrior, focusing on and solving reverse engineering challenges.
Active CTF Player Regularly participate in various other Capture The Flag competitions to continuously sharpen skills.