Elias Bachaalany

Elias Bachaalany

Redmond, Washington, United States
2K followers 500+ connections

About

As a game security engineer at Microsoft, I have experience in working with various first…

Services

Activity

Join now to see all activity

Experience

  • PassingTheKnowledge, LLC

    Bellevue, WA

  • -

    Redmond, Washington, United States

  • -

    Freelance

  • -

    Irvine, CA

  • -

    Greater Seattle Area

  • -

    Redmond, Washington

  • -

  • -

    Belgium

  • -

    Achrafieh

  • -

  • -

  • -

  • -

Education

  • American University of Science and Technology Graphic

    American University of Science and Technology

    -

    Activities and Societies: I joined university late, and at a slow pace I graduated. Meanwhile I was *unofficially* tutoring students on Saturdays in the campus. Later after graduation I was *officially* giving lab sessions for C++ and Java students two times per week.

    Studied Computer Science
    Lab Assistant
    Designed and implemented an open source interpreter language to teach programming

Licenses & Certifications

Publications

  • Batchography: The Art of Batch Files Programming

    PassingTheKnowledge, LLC

    Long gone are the days when you had to use search engines to jump from one website to another in order to figure out the syntax or how to solve a problem using a Batch file script. The Batchography book is a boon for system administrators, build engineers, programmers and home users alike. It takes you on a journey of re-discovery of the lost art of Batch files programming. Whether you are an experienced user or new to the language, you will be surprised by the clarity and the abundance of the…

    Long gone are the days when you had to use search engines to jump from one website to another in order to figure out the syntax or how to solve a problem using a Batch file script. The Batchography book is a boon for system administrators, build engineers, programmers and home users alike. It takes you on a journey of re-discovery of the lost art of Batch files programming. Whether you are an experienced user or new to the language, you will be surprised by the clarity and the abundance of the material presented in this book. With more than 140 scripting recipes, you will learn about things that you never thought were possible to achieve using the Batch files scripting language. In the Batchography book, you will learn about: the basic concepts of Batch file scripting, data structures (Arrays, Stacks, Sets, Maps), Function calls and repetition control structures, Files and strings manipulation techniques, Debugging and troubleshooting tips, Coding conventions and testing methodologies. As a bonus, the book also includes the Hangman game completely written using the Batch files scripting language!

    See publication
  • The Antivirus Hacker's Handbook

    Wiley

    Hack your antivirus software to stamp out future vulnerabilities
    The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start…

    Hack your antivirus software to stamp out future vulnerabilities
    The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software—all of which can help you strengthen your network and protect your data.

    While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network.

    Discover how to reverse engineer your antivirus software
    Explore methods of antivirus software evasion
    Consider different ways to attack and exploit antivirus software
    Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software
    The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.

    Other authors
    See publication
  • Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

    John Wiley & Sons

    Our reverse engineering book is out. Please buy it to learn how to analyze malware / rootkits and help hungry and less-than-fortunate kids around the world. Here is the back cover:

    ==Back cover==
    LEARN THE SCIENCE AND CRAFT OF REVERSE ENGINEERING TO FIGHT HACKERS AND ROOTKITS

    Criminals increasingly are using malicious software (exploits, viruses, rootkits, etc.) for fraud, denial-of-service, intrusions, and espionage operations. Reverse engineering is the only method to…

    Our reverse engineering book is out. Please buy it to learn how to analyze malware / rootkits and help hungry and less-than-fortunate kids around the world. Here is the back cover:

    ==Back cover==
    LEARN THE SCIENCE AND CRAFT OF REVERSE ENGINEERING TO FIGHT HACKERS AND ROOTKITS

    Criminals increasingly are using malicious software (exploits, viruses, rootkits, etc.) for fraud, denial-of-service, intrusions, and espionage operations. Reverse engineering is the only method to thoroughly dissect and understand such software. So it is no surprise that reverse engineering is one of the most important subjects in information security. Unfortunately, it is often perceived as a mysterious and complex black art. Although reverse engineering is a difficult subject, the authors believe there is a scientific approach to it. Practical Reverse Engineering aims to demystify the art and systematize the reverse-engineering process for students and professionals.

    Discover a unique, systematic approach to reverse engineering that incorporates hands-on analysis with real-world malware
    Find detailed coverage of the three most popular processor architectures: x86, x64, and ARM
    Use this concise, structured treatment of the Windows kernel and kernel-mode drivers, featuring walk-throughs and exercises with real-world rootkits
    Learn sophisticated code-obfuscation techniques, such as those used in virtual machine protections, and how to deobfuscate them using program-analysis techniques
    Discover advanced debugging techniques to automate and streamline the reverse-engineering process
    Apply newly learned concepts with complete walk-throughs and exercises using real-world malware

    Other authors
    See publication
  • CodeProject articles

    various technical articles

Patents

  • Matching Program Sections Through Feature Extraction

    Issued US 20150317138

    Various techniques for matching program sections are described herein. In one example, a method includes organizing a program into blocks based on control flow. The method also includes calculating a plurality of features for each block. The method further includes comparing the calculated features for each block with other blocks and creating a list of equivalent blocks. The method also further includes constructing a list of equivalent program sections utilizing the list of equivalent…

    Various techniques for matching program sections are described herein. In one example, a method includes organizing a program into blocks based on control flow. The method also includes calculating a plurality of features for each block. The method further includes comparing the calculated features for each block with other blocks and creating a list of equivalent blocks. The method also further includes constructing a list of equivalent program sections utilizing the list of equivalent blocks.

    Other inventors
    See patent

Projects

  • AllThingsIDA

    - Present

    I run the @allthingsida Youtube channel. Focus on teaching practical reverse engineering with IDA Pro and various reverse engineering tools.

  • IDA Plugins

    -

    I maintain various IDA Pro and Hex-Rays plugins on my GitHub Repo. Namely the `ida-scripts` plugin is one of the most successful productivity plugin out there.

  • TheBigPromptLibrary

    -

    An open source repository of various LLMs system prompts and custom instructions.

    I have retrieved 700+ custom GPT instructions from ChatGPT GPT Store. One of a kind repository on the internet.

Languages

  • English

    Native or bilingual proficiency

  • Arabic

    Native or bilingual proficiency

  • French

    Native or bilingual proficiency

  • German

    Elementary proficiency

Recommendations received

More activity by Elias

View Elias’ full profile

  • See who you know in common
  • Get introduced
  • Contact Elias directly
Join to view full profile

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Elias Bachaalany

Add new skills with these courses