About

About

Eslam Mohamed Abbas "Mr Robot"

“Sometimes I dream of saving the world. Saving everyone from the invisible hand… the one that controls us every day but we don’t know it.”

As a Reverse Engineer, Malware Analyst, and Cybersecurity Specialist, I’ve dedicated my journey to understanding and dismantling the hidden threats that infiltrate our digital landscape. Whether through reverse engineering malicious software or educating future cybersecurity experts, my goal is to stand on the frontlines of this invisible war—unraveling the intricacies of malware and defending against cyber threats that most people can’t even see.


🔍 Specializations in Cybersecurity

“Control is an illusion, but sometimes you need the illusion to gain control.”
Control is at the heart of what I do—control over the systems that attackers seek to exploit. In my work as a malware analyst, I dig deep into the binary code of malicious programs, peeling back layers to discover the strategies and mechanisms used by attackers. My reverse engineering skills allow me to gain insights into zero-day vulnerabilities and hidden functionalities, giving defenders the power to patch weaknesses and eliminate threats.

I specialize in:

  • Malware Analysis: Identifying, deconstructing, and analyzing malicious software to detect attack vectors and behaviors.
  • Reverse Engineering: Using tools like Ghidra, IDA Pro, and x64dbg, I reverse-engineer binaries to reveal their secrets and decode encrypted payloads.
  • Capture The Flag (CTF) Challenges: Competitive CTF events have sharpened my skills in real-world problem-solving and exploit development.
  • Threat Intelligence: Gathering and analyzing cyber threat data to prevent attacks before they happen, and crafting countermeasures against emerging threats.

🎯 Professional Experience

“There’s a code even in the chaos, and my job is to find it.”
My journey through the world of cybersecurity is one driven by curiosity and a relentless pursuit of knowledge. Each role I’ve taken on has pushed me further into the depths of cyber defense and attack methodologies, challenging me to solve complex puzzles in order to keep systems safe. My professional experience highlights the blend of offensive and defensive strategies required to survive in this world of ever-evolving threats.

Instructor at OpenSecurity Training

“The key to hacking isn’t just technical—it’s the mindset.”
At OpenSecurity Training, I teach reverse engineering and malware analysis to a global audience, sharing my knowledge and helping others develop the skills to defend against advanced cyber threats.

  • Delivered courses on reverse engineering techniques, binary exploitation, and malware dissection.
  • Created practical exercises and challenges based on real-world attacks, helping students understand the methods attackers use.
  • Focused on both defensive and offensive techniques, empowering students to see security from both perspectives.

Instructor at AMIT and Instant Courses

My role as an instructor extends beyond OpenSecurity Training, as I also teach at AMIT and Instant Courses. Here, I mentor students on a wide range of topics, from basic cybersecurity principles to advanced malware reverse engineering.

  • Developed courses that covered cyber threat analysis, malware forensics, and penetration testing.
  • Guided students through hands-on labs and challenges to ensure practical application of their skills.
  • Mentored young professionals aiming to enter the cybersecurity field.

CTF Developer & Author at CyberTalents

At CyberTalents, I developed reverse engineering challenges that forced participants to think like attackers. My challenges, based on real-world malware and advanced obfuscation techniques, helped participants hone their skills in identifying exploits and decoding encrypted data.

  • Created challenges based on malware obfuscation, file analysis, and runtime behavior.
  • Crafted step-by-step solutions for participants, guiding them through each layer of the problem-solving process.
  • Collaborated with other experts to continuously update and create new challenges.

Malware Analyst at Flothers

Working as a Malware Analyst at Flothers, I was responsible for analyzing malicious software encountered in the wild. Using dynamic and static analysis methods, I broke down malware samples, identifying command and control infrastructure, and exploit techniques used by advanced threat actors.

  • Uncovered new strains of ransomware, botnets, and Trojans.
  • Developed comprehensive reports detailing malware behavior and recommended defense strategies.
  • Worked closely with other analysts to reverse-engineer samples and share intelligence with the broader community.

Cybersecurity Instructor at Kian Academy

“A bug is never just a mistake. It represents something deeper—an opportunity to uncover a hidden vulnerability.”
As an instructor, I taught students to not only find bugs but to see them for what they are: gateways into deeper systems. My classes focused on hands-on cybersecurity training, where students would tackle real-world CTF challenges and reverse engineering exercises under my guidance.

  • Led courses on malware analysis, reverse engineering, and incident response.
  • Developed an extensive curriculum tailored to offensive and defensive cybersecurity.
  • Mentored students on practical application of cybersecurity knowledge in real-world scenarios.

🌟 Volunteer Work

“There’s a difference between doing nothing and being passive. Sometimes the most important thing you can do is watch and wait.”
Volunteer work has played an important role in my career. Through my work in GDSC Cairo and other organizations, I have shared my knowledge with the community and empowered others to join the fight against cyber threats.

  • Google Developer Student Clubs (GDSC) Cairo: Served as Head of Cybersecurity, where I developed educational materials and led workshops on cyber defense techniques.
  • Cybersecurity Competitions: Volunteered as a CTF judge and mentor, guiding students and professionals through difficult challenges and fostering a love for problem-solving and defense.

📜 Achievements & Accolades

“There are no heroes or villains here—just systems, and those brave enough to understand them.”
Throughout my career, I’ve proven my ability to excel in both competitive environments and professional settings. The skills I’ve honed in CTF events and real-world cybersecurity roles have earned me several recognitions:

  • 3rd place in Nahamcon CTF 2024.
  • 5th place in ICMTC CTF 2024.
  • 2nd place in Dell HackTrick 2024 Finals.
  • Best Head of Cybersecurity in GDSC Cairo Season 23/24.

📚 Certifications & Skills

“Skills are the true currency in the digital age.”
I continuously strive to stay ahead of the curve, gaining certifications that validate my expertise in the ever-changing world of cybersecurity:

  • Certified Malware Analysis Fundamentals from [institution].
  • SOC Analysis Tier 1 certification.
  • OSINT Investigator Fundamentals certification.

In addition to my certifications, I am proficient in the following tools and languages:

  • Programming: Python, C++, Assembly.
  • Tools: Ghidra, IDA Pro, x64dbg, dnSpy.
  • Platforms: Linux, Windows.
  • Other Tools: Wireshark, Burp Suite, Metasploit.

🎥 YouTube & Blog

“Knowledge isn’t meant to be hoarded—it’s meant to be shared.”
Beyond my professional work, I share insights and tutorials through my YouTube channel and Medium blog, where I break down complex topics into digestible pieces for aspiring cybersecurity professionals.


🔗 Let’s Connect

“Every system has a weakness, and every analyst a solution.”
Whether you’re interested in reverse engineering, malware analysis, or CTF competitions, I’m always eager to collaborate and exchange ideas. Feel free to reach out to me on my social media channels below: