“While at Blizzard, Elias did a multitude of amazing and extremely challenging technical things, many of which I believe are under NDA. His work often did things that sounded fantastical while also being very solid down to earth implementations that "just worked". It's rare to see someone with creative but pragmatic vision, while also having the technical ability to make it happen in a robust way. I also enjoyed his company wide technical presentations where he would share his knowledge and experience with the rest of us, as he was a specialist with a skill set that most of the company's engineers did not have.”
Elias Bachaalany
Redmond, Washington, United States
2K followers
500+ connections
About
As a game security engineer at Microsoft, I have experience in working with various first…
Services
Activity
-
Last day at Objective by the Sea! Had a great time speaking about iOS decompilation. Lots of interesting talks this year! #OBTS
Last day at Objective by the Sea! Had a great time speaking about iOS decompilation. Lots of interesting talks this year! #OBTS
Liked by Elias Bachaalany
-
Kaspersky's GReAT open sourced their comprehensive IDA plugin for malware analysis dubbed hrtng, which they use "on a daily basis". The plugin…
Kaspersky's GReAT open sourced their comprehensive IDA plugin for malware analysis dubbed hrtng, which they use "on a daily basis". The plugin…
Liked by Elias Bachaalany
Experience
-
PassingTheKnowledge, LLC
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
-
American University of Science and Technology
-
Activities and Societies: I joined university late, and at a slow pace I graduated. Meanwhile I was *unofficially* tutoring students on Saturdays in the campus. Later after graduation I was *officially* giving lab sessions for C++ and Java students two times per week.
Studied Computer Science
Lab Assistant
Designed and implemented an open source interpreter language to teach programming
Licenses & Certifications
Publications
-
Batchography: The Art of Batch Files Programming
PassingTheKnowledge, LLC
Long gone are the days when you had to use search engines to jump from one website to another in order to figure out the syntax or how to solve a problem using a Batch file script. The Batchography book is a boon for system administrators, build engineers, programmers and home users alike. It takes you on a journey of re-discovery of the lost art of Batch files programming. Whether you are an experienced user or new to the language, you will be surprised by the clarity and the abundance of the…
Long gone are the days when you had to use search engines to jump from one website to another in order to figure out the syntax or how to solve a problem using a Batch file script. The Batchography book is a boon for system administrators, build engineers, programmers and home users alike. It takes you on a journey of re-discovery of the lost art of Batch files programming. Whether you are an experienced user or new to the language, you will be surprised by the clarity and the abundance of the material presented in this book. With more than 140 scripting recipes, you will learn about things that you never thought were possible to achieve using the Batch files scripting language. In the Batchography book, you will learn about: the basic concepts of Batch file scripting, data structures (Arrays, Stacks, Sets, Maps), Function calls and repetition control structures, Files and strings manipulation techniques, Debugging and troubleshooting tips, Coding conventions and testing methodologies. As a bonus, the book also includes the Hangman game completely written using the Batch files scripting language!
-
The Antivirus Hacker's Handbook
Wiley
Hack your antivirus software to stamp out future vulnerabilities
The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start…Hack your antivirus software to stamp out future vulnerabilities
The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software—all of which can help you strengthen your network and protect your data.
While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network.
Discover how to reverse engineer your antivirus software
Explore methods of antivirus software evasion
Consider different ways to attack and exploit antivirus software
Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software
The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.Other authorsSee publication -
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
John Wiley & Sons
Our reverse engineering book is out. Please buy it to learn how to analyze malware / rootkits and help hungry and less-than-fortunate kids around the world. Here is the back cover:
==Back cover==
LEARN THE SCIENCE AND CRAFT OF REVERSE ENGINEERING TO FIGHT HACKERS AND ROOTKITS
Criminals increasingly are using malicious software (exploits, viruses, rootkits, etc.) for fraud, denial-of-service, intrusions, and espionage operations. Reverse engineering is the only method to…Our reverse engineering book is out. Please buy it to learn how to analyze malware / rootkits and help hungry and less-than-fortunate kids around the world. Here is the back cover:
==Back cover==
LEARN THE SCIENCE AND CRAFT OF REVERSE ENGINEERING TO FIGHT HACKERS AND ROOTKITS
Criminals increasingly are using malicious software (exploits, viruses, rootkits, etc.) for fraud, denial-of-service, intrusions, and espionage operations. Reverse engineering is the only method to thoroughly dissect and understand such software. So it is no surprise that reverse engineering is one of the most important subjects in information security. Unfortunately, it is often perceived as a mysterious and complex black art. Although reverse engineering is a difficult subject, the authors believe there is a scientific approach to it. Practical Reverse Engineering aims to demystify the art and systematize the reverse-engineering process for students and professionals.
Discover a unique, systematic approach to reverse engineering that incorporates hands-on analysis with real-world malware
Find detailed coverage of the three most popular processor architectures: x86, x64, and ARM
Use this concise, structured treatment of the Windows kernel and kernel-mode drivers, featuring walk-throughs and exercises with real-world rootkits
Learn sophisticated code-obfuscation techniques, such as those used in virtual machine protections, and how to deobfuscate them using program-analysis techniques
Discover advanced debugging techniques to automate and streamline the reverse-engineering process
Apply newly learned concepts with complete walk-throughs and exercises using real-world malware
Other authorsSee publication
Patents
-
Matching Program Sections Through Feature Extraction
Issued US 20150317138
Various techniques for matching program sections are described herein. In one example, a method includes organizing a program into blocks based on control flow. The method also includes calculating a plurality of features for each block. The method further includes comparing the calculated features for each block with other blocks and creating a list of equivalent blocks. The method also further includes constructing a list of equivalent program sections utilizing the list of equivalent…
Various techniques for matching program sections are described herein. In one example, a method includes organizing a program into blocks based on control flow. The method also includes calculating a plurality of features for each block. The method further includes comparing the calculated features for each block with other blocks and creating a list of equivalent blocks. The method also further includes constructing a list of equivalent program sections utilizing the list of equivalent blocks.
Other inventorsSee patent
Projects
-
AllThingsIDA
- Present
I run the @allthingsida Youtube channel. Focus on teaching practical reverse engineering with IDA Pro and various reverse engineering tools.
-
IDA Plugins
-
I maintain various IDA Pro and Hex-Rays plugins on my GitHub Repo. Namely the `ida-scripts` plugin is one of the most successful productivity plugin out there.
-
TheBigPromptLibrary
-
An open source repository of various LLMs system prompts and custom instructions.
I have retrieved 700+ custom GPT instructions from ChatGPT GPT Store. One of a kind repository on the internet.
Languages
-
English
Native or bilingual proficiency
-
Arabic
Native or bilingual proficiency
-
French
Native or bilingual proficiency
-
German
Elementary proficiency
Recommendations received
3 people have recommended Elias
Join now to viewMore activity by Elias
-
Mark your calendars for #GitKon2024! I’m thrilled to share my thoughts on Automating Threat Modeling with AI at this free, virtual event hosted by…
Mark your calendars for #GitKon2024! I’m thrilled to share my thoughts on Automating Threat Modeling with AI at this free, virtual event hosted by…
Liked by Elias Bachaalany
-
I updated all host, exercise, and demo setups of my hypervisor class to the latest version of OSes (Ubuntu 24, Windows 11 24H2, and macOS 15). If…
I updated all host, exercise, and demo setups of my hypervisor class to the latest version of OSes (Ubuntu 24, Windows 11 24H2, and macOS 15). If…
Liked by Elias Bachaalany
-
What happens when your CPU has a buggy assembly instruction? Check out the latest LaurieWired video! We look at GhostWrite, a RISC-V vulnerability…
What happens when your CPU has a buggy assembly instruction? Check out the latest LaurieWired video! We look at GhostWrite, a RISC-V vulnerability…
Liked by Elias Bachaalany
-
Our team is hiring again: https://goo.gle/4hGr0Rn Great role doing some really impactful things, in our downtown Austin office. We do detection…
Our team is hiring again: https://goo.gle/4hGr0Rn Great role doing some really impactful things, in our downtown Austin office. We do detection…
Liked by Elias Bachaalany
-
This is a slightly edited re-upload of my interview with Stephen Sims, originally recorded on July 5th, 2024. In this interview, I talk about my…
This is a slightly edited re-upload of my interview with Stephen Sims, originally recorded on July 5th, 2024. In this interview, I talk about my…
Shared by Elias Bachaalany
-
We're sharing updates on #HyperDbg releases and debugging tips on #Bluesky and #Mastodon too! You can also follow us there. 😊 -…
We're sharing updates on #HyperDbg releases and debugging tips on #Bluesky and #Mastodon too! You can also follow us there. 😊 -…
Liked by Elias Bachaalany
-
Alexey is one of the best trainers. Those interested, please make use of this great opportunity to learn from the best.
Alexey is one of the best trainers. Those interested, please make use of this great opportunity to learn from the best.
Liked by Elias Bachaalany
-
Thanks Xeno Kovah and Dimitar Tomov for the chance to do the beta of TPM 1101 and 1102. I really enjoyed the course and can highly recommend…
Thanks Xeno Kovah and Dimitar Tomov for the chance to do the beta of TPM 1101 and 1102. I really enjoyed the course and can highly recommend…
Liked by Elias Bachaalany
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Elias Bachaalany
-
Elias Bachaalany
CEO at AUTOMATIX , CDO at NEUVATEK
-
Elias Bachaalany
Responsable Achats, Stock, Logistique & Administration
-
Elias BACHAALANY
--
3 others named Elias Bachaalany are on LinkedIn
See others named Elias Bachaalany