PinnedPublished inInfoSec Write-upsMaldev : [Evasion] Shellcode Injection and Fileless ExecutionMalware Development using Golang — Shellcode injection5d ago5d ago
PinnedPublished inInfoSec Write-upsMalware Analysis : HTB Sherloc OpSalwarKameez24–1: Super-StarSherlockDec 7Dec 7
Published inInfoSec Write-upsWorking with Shellcode from MalwareExtracting shellcode from piece of malwareNov 28Nov 28
Published inInfoSec Write-ups3 Way vs 4 Way HandshakeUnderstanding, Cryptography, and Real-World ApplicationsNov 27Nov 27
Crypt-Ghouls: Unveiling the Shared Arsenal of Hacktivist GroupsReady to dive deeper into the intriguing world of hacktivism? Let’s uncover how groups like Anonymous Sudan, KillNet, and the newly…Oct 20Oct 20
ClearFake Malware CampaignClearFake malware leverages blockchain technology used the EtherHide technique, specifically the Binance Smart Chain.Sep 19Sep 19
Published inInfoSec Write-upsIMSI Catcher Attack and Threat Model on 2G network.implementation of the OsmocomBB project designed for conducting IMSI catcher research on 2G networks. this project for research 2G Nework.Aug 11Aug 11
Published inInfoSec Write-upsTCP1P CTF : Blockchain Callenge WriteupLet’s dive in and unravel the mysteries of this CTF blockchain challenge together!Jul 51Jul 51