top of page
This site was designed with the
.com
website builder. Create your website today.
Start Now
Home
About
Blog
Contact
More
Use tab to navigate through the menu items.
A personal journey about
Hacking
By
Doing
CVE-2025-13654: Stack Buffer Overflow in Duc via Integer Underflow
Heap Out-of-Bounds Read in Hermes JavaScript Engine: A Technical Deep Dive
Walkthrough: Pre-auth DoS in IBM Verify FreeRADIUS reference module (unchecked realloc)
Malware Analysis: Android Malware Disguised as GB WhatsApp
Redline Stealer: A Technical Examination of Modern Malware Tactics
Malware Development - Creating a Covert Spyware (Loader & Main Payload) in C
Comprehensive Malware Analysis: Dissecting Agent Tesla’s Evasion Tactics, Persistence, and Network Behavior
Shamoon - An Advanced Static and Dynamic Analysis of Iran’s Wiper Malware
Micropsia: In-Depth Analysis of a Hamas-Linked Cyber Warfare RAT
Karkoff: Static & Dynamic Analysis of an Iranian Trojan
Reverse Engineering and Cracking a Software Registration System
Game Hacking Walkthrough: CubeMadness1 room on Hack The Box
bottom of page