Skip to content
View Arrbat's full-sized avatar
💭
Open to work
💭
Open to work

Block or report Arrbat

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Arrbat/README.md

Hi there👋🏼

I'm Malware Analyst focused on reverse engineering, detection engineering, and practical malware research.

I work on real samples, write reports, extract IOCs, map behavior to MITRE ATT&CK, and build tools and scripts when analysis benefits from automation.

What I focus on

  • Malware analysis and reverse engineering of Windows, Linux, and script-based threats
  • Anti-analysis, obfuscation, unpacking, and deobfuscation
  • Detection engineering with YARA, Sigma, IOCs, and ATT&CK mapping
  • Tooling and automation in C/C++ and Python for analysis workflows

Selected work

  • BlackCat / ALPHV Research — longitudinal technical analysis of BlackCat ransomware across 2021–2023.
    Static, dynamic, and partial reverse engineering of Windows PE, Linux ELF, and PowerShell samples; cryptographic analysis; behavior analysis; infrastructure and victimology overview; defensive implications and detection priorities. (link)

  • Malware Reports / Writeups — analysis reports covering sample behavior, IOCs, ATT&CK mapping, and detection logic.
    Includes detection-oriented outputs such as YARA and Sigma rules where applicable. (link)

  • PE Packer Research — a research project focused on evasion and anti-analysis techniques.
    Includes custom cryptography, anti-debugging, and process hollowing. (link to Veil-Forge)

  • Analysis Tooling — small utilities and scripts for malware triage, deobfuscation, and network IOCs extraction.

Skills

  • Reverse engineering: Binary Ninja, Ghidra, x64dbg / x32dbg, x86 / x64
  • Languages: C / C++, Python
  • Malware triage: Procmon, FakeNet, Wireshark, Sandboxes, Threat Vendors
  • Detection: YARA, Sigma, IOC extraction, MITRE ATT&CK
  • Crypto: ChaCha20-Poly1305, RSA, HKDF, SHA-256, applied cryptography
  • Other: unpacking, obfuscation analysis, deobfuscation scripting

Languages

  • Ukrainian — Native
  • Russian — Native
  • English — B2
  • Polish — B1

Contact

Pinned Loading

  1. Veil-Forge Veil-Forge Public

    CLI tool for shielding your app from static and dynamic analysis

    C 6 3

  2. MALWARE_ANALYSIS MALWARE_ANALYSIS Public

    Repository describes behavior of some malwares in detailed reports. There are reports and if needed - custom YARA (or other) rules, scripts etc.

    YARA 2

  3. CTF_AND_CRACKMES_WRITEUPS CTF_AND_CRACKMES_WRITEUPS Public

    Writups on solved cracmes/CTF challenges. Custom scripts, rules and different goals of writeups are presented

    Python 1