Reverse Engineering.EXE
I dig through binaries, strip the noise, and ship clean results. No fluff.
>>> ABOUT.DAT <<<
Who am I?
I’m Shaher Dev — a Windows‑obsessed security nerd. I tear things apart, see how they tick, then ship cleaner, faster tools. No fluff, just results.
What I mess with
Reverse engineering & binary digging · Malware behavior + YARA · Windows internals & performance · Licensing, telemetry, anti‑tamper.
Principles
Evidence over hype · Reproducible setups · Safe rollbacks · Minimal surface, maximal clarity.
>>> SKILLS.SYS <<<
🔬 Reverse Engineering
Taking apart programs and poking around their insides.
🦠 Malware Analysis
Checking nasty code and shutting it down.
⚡ C++ / Go / Python
Fast, solid tooling I actually use daily.
🛡️ Security R&D
Kernel tricks, bypass ideas, and telemetry.
🧰 System Tuning
Remove the extra load and keep performance clean and quick.
🌐 Network
Protocols, secure APIs, and tight configs.
>>> PROJECTS.LOG <<<
🔒 Malware Analysis Kit
Scripts + tools to catch behavior, grab IOCs, and sort samples with YARA.
🧩 RE Toolkit
Custom C++ bits for binary checks, patch tests, and neat reports.
⚙️ Tweak Shaher Ultimate
Serious Windows tweaks — real gains, safe rollbacks, no fake claims.
>>> SUPPORT TEAM <<<
Saud
Support Team Member
Shanks
Support Team Member
5njr
Support Team Member
>>> CONTACT.EXE <<<
Hit me up
For real work only. Drop the scope, environment, and limits.
Heads up
I answer with a timeline and terms. Let’s keep it sharp.
- Evidence over hype
- Minimal surface, safe rollbacks
- Reproducible results