
Shrutirupa Banerjiee (She/Her)
@freak_crypt
Followers
1K
Following
6K
Media
278
Statuses
5K
Malware Researcher | Reverse Engineer | Ex GoogleDevExpert | Speaker
YouTube
Joined September 2018
Hello Everyone, I have created my YouTube Channel - CryptoWare. We will be learning about Malware Analysis and similar topics. Please Like, Share, and Subscribe to my channel. Link:- . PS: All kinds of feedback are welcome :) . #infosec #cybersecurity.
4
13
30
RT @pentest_swissky: Application Security Engineer Interview Questions - @security_prince.
ishaqmohammed.me
Some of the questions/topics that i was asked when I was giving interviews for Application/Product Security Engineering roles. I am sure this is not an exhaustive list but I felt these questions were...
0
31
0
π¨ New RE video!. π― Solving a #Crackmes.one challenge.π§ Bypass anti-debug.π Find username & password.π§ Tool: #x32dbg.π₯ Beginner-friendly & hands-on. πΊ Watch here: #ReverseEngineering #MalwareAnalysis #CyberSecurity #InfoSec #RE4Beginners.
0
0
3
New Video Alert!!! In this video, I debug & analyze WannaCry inside a virtualized environment. If you're new to malware analysis, this is a perfect starting point!. This is just Part 1βfull analysis coming soon!. πΊ Watch now & subscribe: #malwareanalysis.
0
1
1
New videos alert!!. π Locky Ransomware Analysis - Part 2.β‘οΈ Why couldn't Locky encrypt? Watch: .π WannaCry - Did it run after Locky?.β‘οΈ Upcoming: Debugging WannaCry's encryption process! Stay tuned. #MalwareAnalysis.
0
0
1
π New YouTube Video Alert!. Learn reverse engineering with a simple crackme challenge, perfect for beginners with minimal assembly knowledge. π₯ Watch here: β οΈ Always use a sandbox!. #malware #reverseengineering #CyberSecurity.
0
1
2
RT @GDGCoimbatore: π¨ Don't miss Shrutirupa @freak_crypt, Google Developer Expert, at #DevFest2024 #Coimbatore!. She'll be exposing the darβ¦.
0
1
0
π¨ New Video Alert on my channel CryptoW@re! π¨. Here we're diving into Locky ransomware using x32dbg. Weβll uncover some subtle tricks it performs before encryption kicks in. This is Part 1 of our analysis. This approach is perfect for beginners. Link:-
0
1
2
π Deobfuscating another sample in my latest video! Looked tough, but with the right tools, it was easy. π₯ More complex obfuscation coming soon, perfect for beginners! π‘οΈ .Pro tip: Always analyze in a sandbox. Like, share, and subscribe! π. #malware.
0
2
6
RT @J1NNX26: Hi everyone, Iβm seeking new career opportunities and would greatly appreciate your support. Iβm ready to embrace new challengβ¦.
0
4
0
π¨ New Video Alert! .Dive into #MalwareAnalysis with me as we explore bypassing the IsDebuggerPresent APIβan essential technique for evading debuggers. My channel, CryptoW@re, is focused on beginner-level content. Link- #malware #debugging.
0
2
3
RT @re_and_more: RE tip of the day: There are multiple artifacts revealing the presence of the VM to malware on a guest system, mainly assoβ¦.
0
7
0
RT @re_and_more: RE tip of the day: Malware can detect VM by simply checking hardware details (model, manufacturer, etc) on the current macβ¦.
0
13
0