> security.re — live

Reverse Engineering.EXE

I dig through binaries, strip the noise, and ship clean results. No fluff.

$ whoami — Shaher Dev
SYSTEM STATUS
OK · SECURE
Version v1.0.0 ·

>>> ABOUT.DAT <<<

Who am I?

I’m Shaher Dev — a Windows‑obsessed security nerd. I tear things apart, see how they tick, then ship cleaner, faster tools. No fluff, just results.

What I mess with

Reverse engineering & binary digging · Malware behavior + YARA · Windows internals & performance · Licensing, telemetry, anti‑tamper.

Principles

Evidence over hype · Reproducible setups · Safe rollbacks · Minimal surface, maximal clarity.

>>> SKILLS.SYS <<<

🔬 Reverse Engineering

Taking apart programs and poking around their insides.

🦠 Malware Analysis

Checking nasty code and shutting it down.

⚡ C++ / Go / Python

Fast, solid tooling I actually use daily.

🛡️ Security R&D

Kernel tricks, bypass ideas, and telemetry.

🧰 System Tuning

Remove the extra load and keep performance clean and quick.

🌐 Network

Protocols, secure APIs, and tight configs.

>>> PROJECTS.LOG <<<

🔒 Malware Analysis Kit

Scripts + tools to catch behavior, grab IOCs, and sort samples with YARA.

YARAETWSandboxWin32

🧩 RE Toolkit

Custom C++ bits for binary checks, patch tests, and neat reports.

C++CapstoneZydisImGui

⚙️ Tweak Shaher Ultimate

Serious Windows tweaks — real gains, safe rollbacks, no fake claims.

PowerShellPythonNuitka

>>> SUPPORT TEAM <<<

Saud

Support Team Member

Shanks

Support Team Member

5njr

Support Team Member

>>> CONTACT.EXE <<<

Hit me up

For real work only. Drop the scope, environment, and limits.

Heads up

I answer with a timeline and terms. Let’s keep it sharp.

  • Evidence over hype
  • Minimal surface, safe rollbacks
  • Reproducible results