Willi Ballenthin is a reverse engineer in the FireEye Labs Advanced Reverse Engineering (FLARE) Team who specializes in incident response and computer forensics. He can typically be found investigating intrusions at Fortune 500 companies and enjoys reverse engineering malware, developing forensic techniques, and exploring the cutting edge. Willi is the author of a number of cross-platform Python libraries including python-registry, python-evtx... Read More →
Staff Reverse Engineer, FireEye, Inc.
Matt Graeber (@mattifestation) is a reverse engineer in the FireEye Labs Advanced Reverse Engineering (FLARE) Team with a varied background in reverse engineering, red teaming, and offensive tool development. Since joining FireEye, Matt has reversed a vast quantity of targeted and commodity malware samples and served as an instructor of Mandiant’s Advanced Malware Analysis course. Matt is the author of various PowerShell modules used for... Read More →
Staff Reverse Engineer, FireEye, Inc
Claudiu Teodorescu is a reverse engineer in the FireEye Labs Advanced Reverse Engineering (FLARE) Team. Prior to joining FireEye, Claudiu worked for Guidance Software, writing forensic parsers for different file formats to support the EnCase forensic tool. Also, as the Cryptographic Officer of the company, he supported EnCase integration with different disk/volume/file based encryption products including Bitlocker, McAfee EEPC, Checkpoint FDE... Read More →