10 tahun capsule cryptoBila ditanyakan kepada orang ramai, adakah kamu hendak menjadi kaya ataupun jutawan. Ramai menjawab ya.Ada juga berangan2, andai kata aku…Jul 12, 2021Jul 12, 2021
Time in your hands ChallengeYou found login source code of the bank on the dark web.You test the administrator password on bank site, but it already changes.How can…Jun 28, 2021Jun 28, 2021
Online game exploitation and mitigation.Hi, for this topic I want to share my experience and security approach how to prevent player abuse your system or server in any kind of…Oct 30, 2020Oct 30, 2020
Translate chinese unicode in .exe application.Hi, for this introduction , I just to share some guide how to translate chinese unicode inside MZ application.For this guide, I will use…Oct 23, 2020Oct 23, 2020
A fun platform for learning modern cryptography Series 2After the first series which I code in python, now same challenge which I remake in C++, but why?.. as you know, python and C++ is…Oct 7, 2020Oct 7, 2020
JWT and Base64 Secret that you must know.Hi, after few months I have been busy with works ,study new things and doing hacking challenges. I feel that , this knowledge must be…Aug 28, 20203Aug 28, 20203
A fun platform for learning modern cryptography Series 1CryptoHack is a fun platform for learning cryptography. The emphasis is on breaking bad implementations of “modern” crypto, such as AES…Apr 7, 20201Apr 7, 20201
Python Jailbreak MasteryIf you ever get a second chance in life for something, you’ve got to go all the way. A man deserves a second chance, but keep an eye on…Apr 4, 20201Apr 4, 20201
Reproduce and Study Proof of Concept (PoC) with Nessus naslMost of my friends ask me, how Nessus can show the service is vulnerable if there no public PoC or exploit about it(eg: ms16–047). So, I…Mar 17, 2020Mar 17, 2020
Ghost Cat Vulnerability In in depthAs we know Ghostcat(CVE-2020–1938) has been a hot issue since last week. It has caught my curiosity regarding the vulnerability. As a…Mar 12, 2020Mar 12, 2020