
Ishaq Mohammed
@security_prince
Followers
2K
Following
19K
Media
123
Statuses
12K
RT @pentest_swissky: Application Security Engineer Interview Questions - @security_prince.
ishaqmohammed.me
Some of the questions/topics that i was asked when I was giving interviews for Application/Product Security Engineering roles. I am sure this is not an exhaustive list but I felt these questions were...
0
31
0
RT @freak_crypt: New Video Alert!!! In this video, I debug & analyze WannaCry inside a virtualized environment. If you're new to malware an….
0
1
0
RT @freak_crypt: 🚨 New Video Alert!. Tackling a reverse engineering challenge from 🧩 with:.🔍 Ghidra + x32dbg.🛠️ Beg….
0
1
0
RT @freak_crypt: 🚀 New YouTube Video Alert!. Learn reverse engineering with a simple crackme challenge, perfect for beginners with minimal….
0
1
0
RT @freak_crypt: New Video Alert!. Learn the basics of PE file structure in my latest video, tailored for complete beginners! 🚀.Perfect for….
0
1
0
RT @clintgibler: Subscriber milestone: >90,000 🤯. That's like 4 BlackHats, or 3 DEF CONs. Every week. I'm incredibly honored and beyond gr….
0
6
0
RT @freak_crypt: 🚨 New Video Alert on my channel CryptoW@re! 🚨. Here we're diving into Locky ransomware using x32dbg. We’ll uncover some su….
0
1
0
RT @freak_crypt: 🔍 Deobfuscating another sample in my latest video! Looked tough, but with the right tools, it was easy. 🎥 More complex obf….
0
2
0
RT @freak_crypt: 🚨 New Video Alert! 🚨. Our latest video analyzes an HTA file from an XLS sample. This sample seems to be a loader with embe….
0
1
0
A huge loss to the infosec community.
@rossjanderson Professor Ross Anderson, FRS, FREng Dear friend and treasured long term campaigner for privacy and security, Professor of Security Engineering at Cambridge University and Edinburgh University, Lovelace Medal winner, has died suddenly at home in Cambridge.
0
1
2
RT @freak_crypt: 🚨 New Video Alert! .Dive into #MalwareAnalysis with me as we explore bypassing the IsDebuggerPresent API—an essential tech….
0
2
0
RT @freak_crypt: 🔍 New Video Alert! 🔍 We're analyzing an XLS sample statically with Oletools. This downloader seems to aim for more files,….
0
1
0
RT @freak_crypt: 🔍 New video alert! 🎥 Dive into the dynamic analysis phase of malware investigation with me on CryptoW@re. I'll guide you t….
0
3
0
RT @freak_crypt: 🚨 New Video Alert on CryptoW@re! 🚨. Dive into the analysis of ASyncRAT. Perfect for beginners to understand malware dissec….
0
1
0
RT @freak_crypt: 🎥 New Video! Dive into analyzing CnC packets with Wireshark for detecting malicious network activity. Watch, like, share,….
0
2
0
RT @freak_crypt: 🚨 New Video Alert! Dive into Wireshark with me 🌐 Learn packet capturing, spotting malicious packets, and more! Don't forge….
0
1
0
RT @freak_crypt: Check out my latest video on CryptoW@re! We're diving into the analysis of a .NET sample protected with SmartAssembly. Wa….
0
1
0
RT @freak_crypt: 🚨 New video alert! Join us as we dissect a malware dropper using a debugger. Discover how to uncover basic details and dec….
0
1
0
RT @freak_crypt: New video alert! 🎥 Dive into the world of malware analysis with me on CryptoW@re. We're breaking down a .NET executable us….
0
2
0
If you haven't already, go check out The Boring AppSec podcast by @anshuman_bh and @JubbaOnJeans.
youtube.com
0
1
4