freak_crypt Profile Banner
Shrutirupa Banerjiee (She/Her) Profile
Shrutirupa Banerjiee (She/Her)

@freak_crypt

Followers
1K
Following
6K
Media
278
Statuses
5K

Malware Researcher | Reverse Engineer | Ex GoogleDevExpert | Speaker

YouTube
Joined September 2018
Don't wanna be here? Send us removal request.
@freak_crypt
Shrutirupa Banerjiee (She/Her)
3 years
Hello Everyone, I have created my YouTube Channel - CryptoWare. We will be learning about Malware Analysis and similar topics. Please Like, Share, and Subscribe to my channel. Link:- . PS: All kinds of feedback are welcome :) . #infosec #cybersecurity.
4
13
30
@grok
Grok
7 days
Turn old photos into videos and see friends and family come to life. Try Grok Imagine, free for a limited time.
709
1K
5K
@freak_crypt
Shrutirupa Banerjiee (She/Her)
3 months
🎯 Day 1 of the Alt-Day RE Challenge is LIVE!. Solving RE challenges from very easy to slightly tricky, perfect for beginners. Using Ghidra, breaking logic, learning as we go. πŸ”.πŸ“½οΈ Watch & solve with me: New video every alternate day.
0
0
0
@freak_crypt
Shrutirupa Banerjiee (She/Her)
4 months
🚨 New RE video!. 🎯 Solving a #Crackmes.one challenge.🧠 Bypass anti-debug.πŸ” Find username & password.πŸ”§ Tool: #x32dbg.πŸŽ₯ Beginner-friendly & hands-on. πŸ“Ί Watch here: #ReverseEngineering #MalwareAnalysis #CyberSecurity #InfoSec #RE4Beginners.
0
0
3
@freak_crypt
Shrutirupa Banerjiee (She/Her)
5 months
1
0
0
@freak_crypt
Shrutirupa Banerjiee (She/Her)
5 months
New Video Alert!!! In this video, I debug & analyze WannaCry inside a virtualized environment. If you're new to malware analysis, this is a perfect starting point!. This is just Part 1β€”full analysis coming soon!. πŸ“Ί Watch now & subscribe: #malwareanalysis.
0
1
1
@freak_crypt
Shrutirupa Banerjiee (She/Her)
6 months
New videos alert!!. πŸ” Locky Ransomware Analysis - Part 2.➑️ Why couldn't Locky encrypt? Watch: .πŸ” WannaCry - Did it run after Locky?.➑️ Upcoming: Debugging WannaCry's encryption process! Stay tuned. #MalwareAnalysis.
0
0
1
@freak_crypt
Shrutirupa Banerjiee (She/Her)
7 months
🚨 New Video Alert!. Tackling a reverse engineering challenge from 🧩 with:.πŸ” Ghidra + x32dbg.πŸ› οΈ Beginner-friendly explanations.πŸ’‘ Code walkthrough for better understanding. πŸ“Ί Watch here:
0
1
3
@freak_crypt
Shrutirupa Banerjiee (She/Her)
8 months
πŸš€ New YouTube Video Alert!. Learn reverse engineering with a simple crackme challenge, perfect for beginners with minimal assembly knowledge. πŸŽ₯ Watch here: ⚠️ Always use a sandbox!. #malware #reverseengineering #CyberSecurity.
0
1
2
@freak_crypt
Shrutirupa Banerjiee (She/Her)
9 months
New Video Alert!. Learn the basics of PE file structure in my latest video, tailored for complete beginners! πŸš€.Perfect for anyone starting their journey in malware analysis or reverse engineering. Always analyze in a sandboxed environment. Watch here:
0
1
2
@freak_crypt
Shrutirupa Banerjiee (She/Her)
9 months
RT @GDGCoimbatore: 🚨 Don't miss Shrutirupa @freak_crypt, Google Developer Expert, at #DevFest2024 #Coimbatore!. She'll be exposing the dar….
0
1
0
@freak_crypt
Shrutirupa Banerjiee (She/Her)
10 months
🚨 New Video Alert on my channel CryptoW@re! 🚨. Here we're diving into Locky ransomware using x32dbg. We’ll uncover some subtle tricks it performs before encryption kicks in. This is Part 1 of our analysis. This approach is perfect for beginners. Link:-
0
1
2
@freak_crypt
Shrutirupa Banerjiee (She/Her)
11 months
πŸ” Deobfuscating another sample in my latest video! Looked tough, but with the right tools, it was easy. πŸŽ₯ More complex obfuscation coming soon, perfect for beginners! πŸ›‘οΈ .Pro tip: Always analyze in a sandbox. Like, share, and subscribe! πŸš€. #malware.
0
2
6
@freak_crypt
Shrutirupa Banerjiee (She/Her)
1 year
🚨 New Video Alert! 🚨. Our latest video analyzes an HTA file from an XLS sample. This sample seems to be a loader with embedded files. Basic analysis done, more to come!. πŸ” Disclaimer: Use a sandboxed environment for analyzing malware. πŸ‘‰ Watch now:
0
1
5
@freak_crypt
Shrutirupa Banerjiee (She/Her)
1 year
RT @security_prince: A huge loss to the infosec community.
0
1
0
@freak_crypt
Shrutirupa Banerjiee (She/Her)
1 year
RT @J1NNX26: Hi everyone, I’m seeking new career opportunities and would greatly appreciate your support. I’m ready to embrace new challeng….
0
4
0
@freak_crypt
Shrutirupa Banerjiee (She/Her)
1 year
🚨 New Video Alert! .Dive into #MalwareAnalysis with me as we explore bypassing the IsDebuggerPresent APIβ€”an essential technique for evading debuggers. My channel, CryptoW@re, is focused on beginner-level content. Link- #malware #debugging.
0
2
3
@freak_crypt
Shrutirupa Banerjiee (She/Her)
1 year
RT @malwrhunterteam: πŸ˜‚
Tweet media one
0
176
0
@freak_crypt
Shrutirupa Banerjiee (She/Her)
1 year
πŸ” New Video Alert! πŸ” We're analyzing an XLS sample statically with Oletools. This downloader seems to aim for more files, but even without the next file, this analysis is perfect for beginners. Watch now and start your malware analysis journey! πŸš€.Link:
0
1
2
@freak_crypt
Shrutirupa Banerjiee (She/Her)
1 year
RT @re_and_more: RE tip of the day: There are multiple artifacts revealing the presence of the VM to malware on a guest system, mainly asso….
0
7
0
@freak_crypt
Shrutirupa Banerjiee (She/Her)
1 year
RT @re_and_more: RE tip of the day: Malware can detect VM by simply checking hardware details (model, manufacturer, etc) on the current mac….
0
13
0