security_prince Profile Banner
Ishaq Mohammed Profile
Ishaq Mohammed

@security_prince

Followers
2K
Following
19K
Media
123
Statuses
12K

AppSec Enthusiast

Joined July 2011
Don't wanna be here? Send us removal request.
@security_prince
Ishaq Mohammed
5 years
2020 - A Not So Technical Review.
ishaqmohammed.me
2020 - A Not So Technical Review
2
6
12
@security_prince
Ishaq Mohammed
5 months
RT @freak_crypt: New Video Alert!!! In this video, I debug & analyze WannaCry inside a virtualized environment. If you're new to malware an….
0
1
0
@security_prince
Ishaq Mohammed
7 months
RT @freak_crypt: 🚨 New Video Alert!. Tackling a reverse engineering challenge from 🧩 with:.🔍 Ghidra + x32dbg.🛠️ Beg….
0
1
0
@security_prince
Ishaq Mohammed
8 months
RT @freak_crypt: 🚀 New YouTube Video Alert!. Learn reverse engineering with a simple crackme challenge, perfect for beginners with minimal….
0
1
0
@security_prince
Ishaq Mohammed
9 months
RT @freak_crypt: New Video Alert!. Learn the basics of PE file structure in my latest video, tailored for complete beginners! 🚀.Perfect for….
0
1
0
@security_prince
Ishaq Mohammed
10 months
RT @clintgibler: Subscriber milestone: >90,000 🤯. That's like 4 BlackHats, or 3 DEF CONs. Every week. I'm incredibly honored and beyond gr….
0
6
0
@security_prince
Ishaq Mohammed
10 months
RT @freak_crypt: 🚨 New Video Alert on my channel CryptoW@re! 🚨. Here we're diving into Locky ransomware using x32dbg. We’ll uncover some su….
0
1
0
@security_prince
Ishaq Mohammed
11 months
RT @freak_crypt: 🔍 Deobfuscating another sample in my latest video! Looked tough, but with the right tools, it was easy. 🎥 More complex obf….
0
2
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: 🚨 New Video Alert! 🚨. Our latest video analyzes an HTA file from an XLS sample. This sample seems to be a loader with embe….
0
1
0
@security_prince
Ishaq Mohammed
1 year
A huge loss to the infosec community.
@duncan_2qq
Duncan Campbell
1 year
@rossjanderson Professor Ross Anderson, FRS, FREng Dear friend and treasured long term campaigner for privacy and security, Professor of Security Engineering at Cambridge University and Edinburgh University, Lovelace Medal winner, has died suddenly at home in Cambridge.
Tweet media one
0
1
2
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: 🚨 New Video Alert! .Dive into #MalwareAnalysis with me as we explore bypassing the IsDebuggerPresent API—an essential tech….
0
2
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: 🔍 New Video Alert! 🔍 We're analyzing an XLS sample statically with Oletools. This downloader seems to aim for more files,….
0
1
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: 🔍 New video alert! 🎥 Dive into the dynamic analysis phase of malware investigation with me on CryptoW@re. I'll guide you t….
0
3
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: 🚨 New Video Alert on CryptoW@re! 🚨. Dive into the analysis of ASyncRAT. Perfect for beginners to understand malware dissec….
0
1
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: 🎥 New Video! Dive into analyzing CnC packets with Wireshark for detecting malicious network activity. Watch, like, share,….
0
2
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: 🚨 New Video Alert! Dive into Wireshark with me 🌐 Learn packet capturing, spotting malicious packets, and more! Don't forge….
0
1
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: Check out my latest video on CryptoW@re! We're diving into the analysis of a .NET sample protected with SmartAssembly. Wa….
0
1
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: 🚨 New video alert! Join us as we dissect a malware dropper using a debugger. Discover how to uncover basic details and dec….
0
1
0
@security_prince
Ishaq Mohammed
1 year
RT @freak_crypt: New video alert! 🎥 Dive into the world of malware analysis with me on CryptoW@re. We're breaking down a .NET executable us….
0
2
0
@security_prince
Ishaq Mohammed
1 year
If you haven't already, go check out The Boring AppSec podcast by @anshuman_bh and @JubbaOnJeans.
Tweet card summary image
youtube.com
0
1
4