Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile
Shrutirupa Banerjiee (She/Her)

@freak_crypt

Malware Researcher | Reverse Engineer | Ex GoogleDevExpert | Speaker

ID: 1038018544082907136

linkhttps://youtube.com/@CryptoWare calendar_today07-09-2018 10:58:01

4,4K Tweet

1,1K Takipçi

301 Takip Edilen

Reverse Engineering and More (@re_and_more) 's Twitter Profile Photo

RE tip of the day: Malware can detect VM by simply checking hardware details (model, manufacturer, etc) on the current machine, for example, using WMI queries: * SELECT * FROM Win32_ComputerSystem * SELECT * FROM Win32_BIOS #infosec #cybersecurity #malware #reverseengineering

Reverse Engineering and More (@re_and_more) 's Twitter Profile Photo

RE tip of the day: There are multiple artifacts revealing the presence of the VM to malware on a guest system, mainly associated with auxiliary tools: * Files * Processes and services * Registry keys * Devices and named pipes #infosec #cybersecurity #malware #reverseengineering

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🔍 New Video Alert! 🔍 We're analyzing an XLS sample statically with Oletools. This downloader seems to aim for more files, but even without the next file, this analysis is perfect for beginners. Watch now and start your malware analysis journey! 🚀 Link: youtube.com/watch?v=pM78cM…

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🚨 New Video Alert! Dive into #MalwareAnalysis with me as we explore bypassing the IsDebuggerPresent API—an essential technique for evading debuggers. My channel, CryptoW@re, is focused on beginner-level content. Link-youtube.com/watch?v=DpzL2f… #malware #debugging

J1NX (@j1nnx26) 's Twitter Profile Photo

Hi everyone, I’m seeking new career opportunities and would greatly appreciate your support. I’m ready to embrace new challenges and continue my professional growth. If you know of any exciting opportunities or are open to a discussion, please feel free to DM me or comment below.

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🚨 New Video Alert! 🚨 Our latest video analyzes an HTA file from an XLS sample. This sample seems to be a loader with embedded files. Basic analysis done, more to come! 🔍 Disclaimer: Use a sandboxed environment for analyzing malware. 👉 Watch now: youtu.be/ThMR1DQHKRQ

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🔍 Deobfuscating another sample in my latest video! Looked tough, but with the right tools, it was easy. 🎥 More complex obfuscation coming soon, perfect for beginners! 🛡️ Pro tip: Always analyze in a sandbox. Like, share, and subscribe! 🚀 youtube.com/watch?v=YPQuru… #malware

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🚨 New Video Alert on my channel CryptoW@re! 🚨 Here we're diving into Locky ransomware using x32dbg. We’ll uncover some subtle tricks it performs before encryption kicks in. This is Part 1 of our analysis This approach is perfect for beginners. Link:- youtu.be/XhYMpn8t8GA

GDG Coimbatore (@gdgcoimbatore) 's Twitter Profile Photo

🚨 Don't miss Shrutirupa Shrutirupa Banerjiee (She/Her), Google Developer Expert, at #DevFest2024 #Coimbatore! She'll be exposing the dark side of #AI in her talk "AI-Powered Malware: The Evolving Threat Landscape." Learn how to protect yourself from the rising threat of AI-driven malware.

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

New Video Alert! Learn the basics of PE file structure in my latest video, tailored for complete beginners! 🚀 Perfect for anyone starting their journey in malware analysis or reverse engineering. Always analyze in a sandboxed environment. Watch here: youtube.com/watch?v=CcZ966…

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🚀 New YouTube Video Alert! Learn reverse engineering with a simple crackme challenge, perfect for beginners with minimal assembly knowledge. 🎥 Watch here: youtu.be/W4flqAvrWCY ⚠️ Always use a sandbox! #malware #reverseengineering #CyberSecurity

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🚨 New Video Alert! Tackling a reverse engineering challenge from Crackmes.one 🧩 with: 🔍 Ghidra + x32dbg 🛠️ Beginner-friendly explanations 💡 Code walkthrough for better understanding 📺 Watch here: youtu.be/1jKP-c3_SSg?si…

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

New videos alert!! 🔍 Locky Ransomware Analysis - Part 2 ➡️ Why couldn't Locky encrypt? Watch: youtube.com/watch?v=Bla2OT…] 🔍 WannaCry - Did it run after Locky? ➡️ youtube.com/watch?v=zrnCBp… Upcoming: Debugging WannaCry's encryption process! Stay tuned. #MalwareAnalysis

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

New Video Alert!!! In this video, I debug & analyze WannaCry inside a virtualized environment. If you're new to malware analysis, this is a perfect starting point! This is just Part 1—full analysis coming soon! 📺 Watch now & subscribe: youtube.com/watch?v=yw8_Cq… #malwareanalysis

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🚨 New RE video! 🎯 Solving a #Crackmes.one challenge 🧠 Bypass anti-debug 🔐 Find username & password 🔧 Tool: #x32dbg 🎥 Beginner-friendly & hands-on 📺 Watch here: youtu.be/vmB5SB39UbQ #ReverseEngineering #MalwareAnalysis #CyberSecurity #InfoSec #RE4Beginners

Shrutirupa Banerjiee (She/Her) (@freak_crypt) 's Twitter Profile Photo

🎯 Day 1 of the Alt-Day RE Challenge is LIVE! Solving RE challenges from very easy to slightly tricky, perfect for beginners. Using Ghidra, breaking logic, learning as we go. 🔍 📽️ Watch & solve with me: youtube.com/watch?v=p5J5BV… New video every alternate day.