Community Contributions

3 minute read

I have been writing articles, walkthroughs since i started in Cyber Security in order to contribute back to the community. All of my current and future articles links will be updated here! Happy Learning!

Author Profiles

  1. Cyber Defense Operations
  2. Medium
  3. GISPP
  4. TryHackMe
  5. LinkedIn

Security Blogs/Articles

  1. The Crown Jewels and The Pyramid of Pain
  2. Analyzing Malicious Word Documents
  3. Analyzing Malicious PDF Files
  4. Just another SNMP article — The Hacker’s Way!
  5. Jeez! Another SPAM Email
  6. SPAM or Disguised MS Outlook?— Credentials Harvester
  7. Registry Run Keys / Startup Folder — Malware Persistence
  8. Windows Command Shell — Malware Execution
  9. System Information Discovery — Gathering System Information For Malware Infections
  10. Hunting Patterns — YARA Rules — A Beginner Friendly Journey
  11. SysInternals — The Other Way Around
  12. BITB - Browser In The Browser Attack
  13. Deeper look into Pakistan Electricity Outage and SideWinder APT Claims
  14. Dissecting 17 Malicious Selenium Packages Observed On PyPi
  15. MALICIOUS PYPI PACKAGES LEADING TO PHISHING WEBSITES
  16. MALICIOUS PYPI PACKAGES LEADING TO PHISHING WEBSITES PART 2
  17. CHINESE SCAMMERS TARGETING QATAR RESIDENTS
  18. DISSECTING MALICIOUS PYPI PACKAGES
  19. NadraGate Part 2 – PaperPk 200,000 Users Data At Risk
  20. Deeper look into Pakistan Electricity Outage and SideWinder APT Claims
  21. Installing Win 11 on Mac M1/M2 for Malware Analysis
  22. Deconstructing Deception - Linguistics and Psychological Insights into Cl0p Ransomware Group
  23. Practical Malware Analysis - Labs Walkthroughs

Malware Analysis

  1. Practical Malware Analysis — Beginning
  2. Practical Malware Analysis — Chapter 1 — Labs 1–1 — Solution
  3. Practical Malware Analysis — Chapter 1 — Lab 1-2 — Solution
  4. Practical Malware Analysis — Chapter 1 — Lab 1–3 — Solution
  5. Practical Malware Analysis — Chapter 1 — Basic Static Analysis
  6. Practical Malware Analysis — Chapter 3— Basic Dynamic Analysis
  7. Practical Malware Analysis — Chapter 3— Lab03–01 — Solution
  8. Practical Malware Analysis — Chapter 3 — Lab03–2— Solution
  9. Practical Malware Analysis — Chapter 3 — Lab03 -03 — Solution
  10. Practical Malware Analysis — Chapter 3 — Lab03–04 — Solution

PowerShell

  1. Learning PowerShell — Let’s Do It Together — Part 1
  2. Learning PowerShell — Let’s Do It Together — Part 2
  3. Learning PowerShell — Let’s Do It Together — Part 3
  4. Learning PowerShell — Let’s Do It Together — Part 4

3. CTFs/RE

  1. PicoCTF 2019 — General Skills
  2. PicoCTF 2019 — Forensics Challenges
  3. picoCTF 2019 — Reverse Engineering— VaultDoors
  4. Reverse Engineering — My First Crackme
  5. Pwnable — FD — Challenge
  6. Simple crackme — Kawaii Flesh — Writeup
  7. mexican — Crackme— Solution
  8. MalwareTech — Hide and Seek Challenges — Writeup!
  9. Cyber Talents — Eye of Sauron
  10. NullByte — VulnHub — Solution
  11. UAE and Sudan National Cyber Security CTF 2019 — Solutions
  12. HSCTF 6 — Forensics Challenges
  13. Beatles Stenography Challenge Solution!
  14. Da Vinci Stenography Challenge Solution!
  15. Hackerman Stenography Challenge Solution!
  16. Unified Stenography Challenge Solution!
  17. Widescreen Stenography Challenge Solution!
  18. Milkshake Stenography Challenge Solution!
  19. OverTheWire — Krypton (Cryptography) Challenges
  20. HSCTF 6 — Web Challenges
  21. Leviathan War-Game Walkthrough!
  22. Comprehensive Zixem SQLi Challenges Solutions — 2019
  23. RFI to RCE Challenge By Zixem (Writeup)
  24. Local File Inclusion (Basic)
  25. Quaoar — hackfest2016 — Walkthrough
  26. Cartographer Web Challenge — HackTheBox
  27. HDC Web Challenge — HackTheBox
  28. Lernaean Web Challenge — HackTheBox
  29. DerpNStink VulnHub — Walkthrough!
  30. VulnHub Machine Troll 1 — Walkthrough
  31. Lampião: 1 Walkthrough!
  32. SickOS 1.2 WalkThrough
  33. SickOS 1.1 Walkthrough
  34. WalkThrough! Kioptrix — 3 By VulnHub
  35. WalkThrough! Kioptrix — 2 By VulnHub
  36. WalkThrough! Kioptrix — 1 (Part 2) By VulnHub
  37. WalkThrough! Kioptrix — 1 By VulnHub
  38. Dumping Router Firmware - A New Room
  39. Easy Steganography
  40. Vulnversity - Writeup
  41. CyberSoc CTF — General Knowledge

4. Tools

  1. NightOwl - An Offline Phishing Email Analyzer
  2. HASHER - Hash Calculations
  3. LazyDNS - Query DNS for Records
  4. Chopper - Analyzing Web Security Headers
  5. Postman Test Script For Validating Security Headers in Postman
  6. Nullog - Cleaning Logs After Your Hack
  7. PELyzer - Analyzing PE Executables
  8. BasePDF - Coverting Base64 into PDFs