Open in app

Sign in

Write

Sign in

KanakSasak
KanakSasak

119 followers

Home

Lists

About

Pinned
InfoSec Write-ups

Published in

InfoSec Write-ups

Shellcode Analysis

Malware Analysis — Advance Dynamic Analysis

Jan 2
Shellcode Analysis
Shellcode Analysis
Jan 2
Pinned
InfoSec Write-ups

Published in

InfoSec Write-ups

Maldev : [Evasion] Shellcode Injection and Fileless Execution

Malware Development using Golang — Shellcode injection

Dec 25, 2024
Maldev : [Evasion] Shellcode Injection and Fileless Execution
Maldev : [Evasion] Shellcode Injection and Fileless Execution
Dec 25, 2024
Pinned
InfoSec Write-ups

Published in

InfoSec Write-ups

Malware Analysis : HTB Sherloc OpSalwarKameez24–1: Super-Star

Sherlock

Dec 7, 2024
Malware Analysis : HTB Sherloc OpSalwarKameez24–1: Super-Star
Malware Analysis : HTB Sherloc OpSalwarKameez24–1: Super-Star
Dec 7, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

Working with Shellcode from Malware

Extracting shellcode from piece of malware

Nov 28, 2024
Working with Shellcode from Malware
Working with Shellcode from Malware
Nov 28, 2024

Zero Knowledge Proof and Modern Blockchain

Zero knowledge proof Cryptography Algorithm

Nov 27, 2024
Zero Knowledge Proof and Modern Blockchain
Zero Knowledge Proof and Modern Blockchain
Nov 27, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

3 Way vs 4 Way Handshake

Understanding, Cryptography, and Real-World Applications

Nov 27, 2024
3 Way vs 4 Way Handshake
3 Way vs 4 Way Handshake
Nov 27, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

Reentrancy Attack on Smart Contract

Blockchain Security

Nov 27, 2024
Reentrancy Attack on Smart Contract
Reentrancy Attack on Smart Contract
Nov 27, 2024

Crypt-Ghouls: Unveiling the Shared Arsenal of Hacktivist Groups

Ready to dive deeper into the intriguing world of hacktivism? Let’s uncover how groups like Anonymous Sudan, KillNet, and the newly…

Oct 20, 2024
Crypt-Ghouls: Unveiling the Shared Arsenal of Hacktivist Groups
Crypt-Ghouls: Unveiling the Shared Arsenal of Hacktivist Groups
Oct 20, 2024

ClearFake Malware Campaign

ClearFake malware leverages blockchain technology used the EtherHide technique, specifically the Binance Smart Chain.

Sep 19, 2024
ClearFake Malware Campaign
ClearFake Malware Campaign
Sep 19, 2024
InfoSec Write-ups

Published in

InfoSec Write-ups

IMSI Catcher Attack and Threat Model on 2G network.

implementation of the OsmocomBB project designed for conducting IMSI catcher research on 2G networks. this project for research 2G Nework.

Aug 11, 2024
1
IMSI Catcher Attack and Threat Model on 2G network.
IMSI Catcher Attack and Threat Model on 2G network.
Aug 11, 2024
1
KanakSasak

KanakSasak

119 followers

Blockchain | Cyber Security

Following
  • Patrick Collins

    Patrick Collins

  • grepStrength

    grepStrength

  • txc

    txc

  • Digit Oktavianto

    Digit Oktavianto

  • Felix Alexander

    Felix Alexander

See all (125)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech