Mystik Treasure Trove
Step into the Mystik Treasure Trove, a curated collection that not only delves deep into the vast world of cybersecurity but also showcases my approach to logically solving challenges. Stemming from hands-on experiences in Capture The Flag challenges (CTFs), professional engagements, and rigorous personal research, this platform offers a diverse range of topics. From Forensics, Reverse-Engineering, and OSINT to the intricate realms of malware analysis and development, each piece of content is crafted to provide insights while highlighting the logical processes behind tackling complex issues. Whether you are a seasoned expert, an aspiring novice, or someone with a budding interest in cybersecurity, the Mystik Treasure Trove is a beacon of knowledge and methodology. Embark on this learning journey with me as we develop the art of problem-solving....
DIGITAL FORENSICS AND INCIDENT RESPONSE
-
Forging flask Session cookies
Writeup
An indepth into forging flask session cookies
-
Hack The Box Apocalypse CTF - passman
Writeup
A writeup for web challenge passman for hack the box apocalypse CTF
-
working offline with volatility3
Writeup
How to work offline with volatility3 - no Symbol table
-
Creating and Identifying profiles with volatility2
Memory-Forensics
a blog on how to identify and create volatility2 profiles
-
Volatility3 under the hood
Memory-Forensics
Delve deep into the workings of volatility3
-
Memory acquisition in windows and linux
Memory-Forensics
A blog on how to acquire memory dumps from windows and linux
-
PCAP forensics on Layer 2 protocols
Network-Forensics
A writeup on Layer 2 network forensics
-
Aspire CTF - Kernel Padding
Writeup
A writeup for kernel padding by Aspire CTF
-
Steganography challenges - Africahackon2021
Writeup
Writeups for steg challenges
-
Linux Memory Forensics
Writeup/Memory-forensics
Linux memory forensics with volatility2
MALWARE ANALYSIS AND MALD3V RESEARCH
-
Assembly Refresher
Malware
An Assembly and CPU Architecture refresher
-
Malicious Javascript Deobfuscation
Malware-analysis
Deobfuscating Malicious Javascript from phishing emails.
-
Polyglots - MalDOC in PDF
Malware-analysis
Analysis on Maldoc Embedded in PDF Attack
-
CVE-2023-36884 doc analysis
Malware-analysis
A detailed analysis of CVE-2023-36884