Egemen Guney KOC

10 posts

Egemen Guney KOC banner
Egemen Guney KOC

Egemen Guney KOC

@egemenguney_koc

Cyber Threat Intelligence Architect | Building Autonomous Malware Analysis Pipelines 🛡️ | Python, Playwright & MISP Integration | Hunting 0-days in the wild.

Antalya/Turkey Katılım Aralık 2025
48 Takip Edilen5 Takipçiler
Egemen Guney KOC
Egemen Guney KOC@egemenguney_koc·
Caught in the wild: Extreme.Injector.v3.7.3It claimed to be a game cheat tool. My bot unpacked it, analyzed the binary, and slapped a 100/100 Malicious verdict on it. It was a Trojan Downloader targeting gamers.
Egemen Guney KOC tweet media
English
0
1
1
22
Egemen Guney KOC
Egemen Guney KOC@egemenguney_koc·
Most scanners just look at file names. My factory goes deeper. 1️⃣ Scans GitHub for obfuscated code patterns. 2️⃣ Downloads & Extracts nested archives (recursive unpacking). 3️⃣ Submits payloads to Falcon Sandbox for behavioral analysis. 4️⃣ Alerts me instantly if the score is >80. 🚨
Egemen Guney KOC tweet media
English
0
1
1
25
Egemen Guney KOC
Egemen Guney KOC@egemenguney_koc·
I built an AI-powered bot that hunts malware while I sleep. 🦅 Meet Threat Hunter Factory v2.0. It just hit a massive milestone: 10,000+ Threats Analyzed completely autonomously. Here is how it works 👇 #CyberSecurity #Python
Egemen Guney KOC tweet media
English
1
1
2
37
Egemen Guney KOC
Egemen Guney KOC@egemenguney_koc·
3/4 Everything is logged in real-time. ✅ Exec extracted (3.7.3.exe) ✅ Falcon Sandbox Submission ✅ Telegram Alert Sent ✅ MISP Event Created
Egemen Guney KOC tweet media
English
0
1
1
24
Egemen Guney KOC
Egemen Guney KOC@egemenguney_koc·
2/4 Case Study: Extreme.Injector.v3.7.3Attackers love hiding behind "useful" tools. My factory followed a dropper chain from GitHub -> MediaFire -> Nested Archive. Final verdict: 100/100 Malicious. 🚨
Egemen Guney KOC tweet media
English
0
1
1
32
Egemen Guney KOC
Egemen Guney KOC@egemenguney_koc·
1/4 🧵 How I built a bot that hunts malware while I sleep. 🦅 My Threat Hunter Factory v2.0 just hit a new milestone: 6,100+ threats analyzed with a 100% autonomous pipeline.
Egemen Guney KOC tweet media
English
0
1
1
25
Egemen Guney KOC
Egemen Guney KOC@egemenguney_koc·
🚨 Just caught a fresh sample: EasyLaunch.exe 🔍 Found via my autonomous pipeline through a multi-stage dropper chain (Google Sites → MediaFire). 📉 Detection: Only 19% on AVs. ⚖️ Threat Score: 44/100 (Suspicious) 🛡️ Verdict: Likely a stealth Trojan with anti-VM evasion. Automated hunting works! Check the full analysis: [Link to Hybrid Analysis Report] #MalwareAnalysis #ThreatIntelligence #OSINT #CyberSecurity #Automation **Affected Repositories (10 shown):** - [DeltaForce-TacticalMenuHub](github.com/naturesda/Delt…) - [DeltaForce-AI-PrecisionPilot](github.com/aristea-aetsir…) - [DeltaForce-AimMaster](github.com/Kirthiv02/Delt…) - [DeltaForce-VisionaryMod](github.com/ay-josiah/Delt…) - [DeltaForce-ShadowEnhancer](github.com/Tiagojose006/D…) - [warzone-2044-advantage-toolkit](github.com/angertie/warzo…) - [BO6-EnhanceHub](github.com/mahesh7095/BO6…) - [mw3-camo-unlocker-tool](github.com/helloguysimbad…) - [Battlefield2042-HyperEdge-Hacks](github.com/unnati384/Batt…) - [valorant-elite-toolkit](github.com/kekobaad/valor…) - ... and 27 more
Egemen Guney KOC tweet media
English
0
1
1
35