M0X
ACTIVE
HOME/ABOUT

malrev0x

security researcher · reverse engineer · malware analyst

I spend my time dissecting malware, tracing threat actors, and building detection tooling. This blog is my public research log — a place to document findings, share YARA rules, and write up techniques I encounter in the wild.

My focus areas are Windows malware, APT tooling, and evasion techniques. I occasionally contribute to open-source detection projects and CTF challenges.

24+
Posts Published
80+
YARA Rules
500+
Samples Analyzed
SKILL_SET
Malware Analysis92%
Reverse Engineering88%
Threat Intelligence80%
YARA / Detection85%
Binary Exploitation72%
Network Forensics76%
TIMELINE
2024 →
Independent Security Researcher
Full-time malware research, publishing analysis on emerging threat actors and tooling.
2022
Threat Intelligence Analyst
Tracked APT campaigns, produced IOC feeds, and built internal YARA rule libraries.
2020
Reverse Engineer
Static and dynamic analysis of ransomware, stealers, and RATs for incident response.
2018
Started in Security
CTF competitions, vulnerability research, and first steps into binary analysis.
CONTACT_LINKS
SYS_INFO
$location=undisclosed
$timezone=UTC+3
$languages=TR / EN
$pgp=available on request
$status=open to collab
RESEARCH
Browse the blog
latest research entries