Articles
I have been writing articles, walkthroughs since i started in Cyber Security in order to contribute back to the community. All of my current and future articles links will be updated here! Happy Learning!
Author Profiles
Security Blogs/Articles
- The Crown Jewels and The Pyramid of Pain
- Analyzing Malicious Word Documents
- Analyzing Malicious PDF Files
- Just another SNMP article β The Hackerβs Way!
- Jeez! Another SPAM Email
- SPAM or Disguised MS Outlook?β Credentials Harvester
- Registry Run Keys / Startup Folder β Malware Persistence
- Windows Command Shell β Malware Execution
- System Information Discovery β Gathering System Information For Malware Infections
- Hunting Patterns β YARA Rules β A Beginner Friendly Journey
- SysInternals β The Other Way Around
- BITB - Browser In The Browser Attack
- Deeper look into Pakistan Electricity Outage and SideWinder APT Claims
- Dissecting 17 Malicious Selenium Packages Observed On PyPi
- MALICIOUS PYPI PACKAGES LEADING TO PHISHING WEBSITES
- MALICIOUS PYPI PACKAGES LEADING TO PHISHING WEBSITES PART 2
- CHINESE SCAMMERS TARGETING QATAR RESIDENTS
- DISSECTING MALICIOUS PYPI PACKAGES
- NadraGate Part 2 β PaperPk 200,000 Users Data At Risk
- Deeper look into Pakistan Electricity Outage and SideWinder APT Claims
- Installing Win 11 on Mac M1/M2 for Malware Analysis
- Deconstructing Deception - Linguistics and Psychological Insights into Cl0p Ransomware Group
- Practical Malware Analysis - Labs Walkthroughs
Malware Analysis
- Practical Malware Analysis β Beginning
- Practical Malware Analysis β Chapter 1 β Labs 1β1 β Solution
- Practical Malware Analysis β Chapter 1 β Lab 1-2 β Solution
- Practical Malware Analysis β Chapter 1 β Lab 1β3 β Solution
- Practical Malware Analysis β Chapter 1 β Basic Static Analysis
- Practical Malware Analysis β Chapter 3β Basic Dynamic Analysis
- Practical Malware Analysis β Chapter 3β Lab03β01 β Solution
- Practical Malware Analysis β Chapter 3 β Lab03β2β Solution
- Practical Malware Analysis β Chapter 3 β Lab03 -03 β Solution
- Practical Malware Analysis β Chapter 3 β Lab03β04 β Solution
PowerShell
- Learning PowerShell β Letβs Do It Together β Part 1
- Learning PowerShell β Letβs Do It Together β Part 2
- Learning PowerShell β Letβs Do It Together β Part 3
- Learning PowerShell β Letβs Do It Together β Part 4
3. CTFs/RE
- PicoCTF 2019 β General Skills
- PicoCTF 2019 β Forensics Challenges
- picoCTF 2019 β Reverse Engineeringβ VaultDoors
- Reverse Engineering β My First Crackme
- Pwnable β FD β Challenge
- Simple crackme β Kawaii Flesh β Writeup
- mexican β Crackmeβ Solution
- MalwareTech β Hide and Seek Challenges β Writeup!
- Cyber Talents β Eye of Sauron
- NullByte β VulnHub β Solution
- UAE and Sudan National Cyber Security CTF 2019 β Solutions
- HSCTF 6 β Forensics Challenges
- Beatles Stenography Challenge Solution!
- Da Vinci Stenography Challenge Solution!
- Hackerman Stenography Challenge Solution!
- Unified Stenography Challenge Solution!
- Widescreen Stenography Challenge Solution!
- Milkshake Stenography Challenge Solution!
- OverTheWire β Krypton (Cryptography) Challenges
- HSCTF 6 β Web Challenges
- Leviathan War-Game Walkthrough!
- Comprehensive Zixem SQLi Challenges Solutions β 2019
- RFI to RCE Challenge By Zixem (Writeup)
- Local File Inclusion (Basic)
- Quaoar β hackfest2016 β Walkthrough
- Cartographer Web Challenge β HackTheBox
- HDC Web Challenge β HackTheBox
- Lernaean Web Challenge β HackTheBox
- DerpNStink VulnHub β Walkthrough!
- VulnHub Machine Troll 1 β Walkthrough
- LampiΓ£o: 1 Walkthrough!
- SickOS 1.2 WalkThrough
- SickOS 1.1 Walkthrough
- WalkThrough! Kioptrix β 3 By VulnHub
- WalkThrough! Kioptrix β 2 By VulnHub
- WalkThrough! Kioptrix β 1 (Part 2) By VulnHub
- WalkThrough! Kioptrix β 1 By VulnHub
- Dumping Router Firmware - A New Room
- Easy Steganography
- Vulnversity - Writeup
- CyberSoc CTF β General Knowledge
4. Tools
- NightOwl - An Offline Phishing Email Analyzer
- HASHER - Hash Calculations
- LazyDNS - Query DNS for Records
- Chopper - Analyzing Web Security Headers
- Postman Test Script For Validating Security Headers in Postman
- Nullog - Cleaning Logs After Your Hack
- PELyzer - Analyzing PE Executables
- BasePDF - Coverting Base64 into PDFs