Blog Posts
Here you will find all my posts, articles, and updates.
Feel free to explore my latest content on pentesting, malware development, and binary exploitation. Each post is a deep dive into a specific topic, designed to share knowledge and insights from my personal journey in cybersecurity.
Happy reading!
Latest Posts :
API Hooking
Today, we are going to talk about a technique used in malware development called API hooking. It is a widely used technique because it allows the behavior of a legitimate API to be modified by redirecting its execution to another custom function. Although API hooking is popular in malware development,

#Maldev #Easy ๐ข
HTB Napper Write-up
Hello guys ! In this write-up, we will delve into Napper, a challenging Windows machine on Hack The Box rated as Hard. Napper presents a unique blend of real-world scenarios and intricate vulnerabilities. The machine features a static blog website compromised with the NAPLISTENER malware, which can be exploited to gain

#CTF #Intermediate-Hard ๐ด
Hello World !
๐ Welcome to My Cyber Playground! ๐ฅ Hey hackers, red teamers, and cyber enthusiasts! ๐พ Iโm launching this blog as a space to dive deep into penetration testing, malware development, and binary exploitation. Expect write-ups, reviews, and mini-courses to sharpen your offensive security skills. Whether youโre into bypassing defenses, crafting payloads, or
