Open in app

Sign In

Write

Sign In

mucomplex
mucomplex

184 Followers

Home

About

Jul 12, 2021

10 tahun capsule crypto

Bila ditanyakan kepada orang ramai, adakah kamu hendak menjadi kaya ataupun jutawan. Ramai menjawab ya.Ada juga berangan2, andai kata aku invest masa mula-mula amazon hendak establish, ataupun menjadi orang pertama yang membeli saham2 facebook,tesla,dan ali baba.Dan ada juga berangan andai kata aku dapat beli bitcoin dulu2, dah tentu aku jadi…

2 min read

10 tahun capsule crypto
10 tahun capsule crypto

2 min read


Jun 28, 2021

Time in your hands Challenge

You found login source code of the bank on the dark web.You test the administrator password on bank site, but it already changes.How can you exploit this system? Questions. What is the problem of this code? What kind of attack is used? how you retrieve real password and know its…

Cracking

1 min read

Time in your hands Challenge
Time in your hands Challenge
Cracking

1 min read


Oct 30, 2020

Online game exploitation and mitigation.

Hi, for this topic I want to share my experience and security approach how to prevent player abuse your system or server in any kind of game. Let me introduce the game that I choose, which is eudemons online. In eudemons online there is table name cq_action ,where all npc…

Game Development

3 min read

Online game exploitation and mitigation.
Online game exploitation and mitigation.
Game Development

3 min read


Oct 23, 2020

Translate chinese unicode in .exe application.

Hi, for this introduction , I just to share some guide how to translate chinese unicode inside MZ application.For this guide, I will use…

Reverse Engineering

2 min read

Translate chinese unicode in .exe application.
Translate chinese unicode in .exe application.
Reverse Engineering

2 min read


Oct 7, 2020

A fun platform for learning modern cryptography Series 2

After the first series which I code in python, now same challenge which I remake in C++, but why?.. as you know, python and C++ is different level language, python more to high level language where you don’t need to handle block of bytes, pointers and etc. Besides that, you…

Cryptography

3 min read

A fun platform for learning modern cryptography Series 2
A fun platform for learning modern cryptography Series 2
Cryptography

3 min read


Aug 28, 2020

JWT and Base64 Secret that you must know.

Hi, after few months I have been busy with works ,study new things and doing hacking challenges. I feel that , this knowledge must be share :D what actually you want to share on this topics?.. well, some of you must changes your perspective how you look base64 encode after…

Jwt

5 min read

JWT and Base64 Secret that you must know.
JWT and Base64 Secret that you must know.
Jwt

5 min read


Apr 7, 2020

A fun platform for learning modern cryptography Series 1

CryptoHack is a fun platform for learning cryptography. The emphasis is on breaking bad implementations of “modern” crypto, such as AES…

Programming

6 min read

A fun platform for learning modern cryptography Series 1
A fun platform for learning modern cryptography Series 1
Programming

6 min read


Apr 4, 2020

Python Jailbreak Mastery

Prerequisite: Knowledge in python programming. Creativity to solves problem. Let me introduce you crucial functions that need to solve the problems. dir() -returns list of the attributes and methods of any object. dir() Rules: 1 -For Class Objects, it returns a list of names of all the valid attributes and…

Programming

8 min read

Python Jailbreak Mastery
Python Jailbreak Mastery
Programming

8 min read


Mar 17, 2020

Reproduce and Study Proof of Concept (PoC) with Nessus nasl

Most of my friends ask me, how Nessus can show the service is vulnerable if there no public PoC or exploit about it(eg: ms16–047). So, I write this article might help your understanding regard to vulnerability that you are interested. As example below, I choose Etag Header Information Disclosure as…

Hacking

3 min read

Reproduce and Study Proof of Concept (PoC) with Nessus nasl
Reproduce and Study Proof of Concept (PoC) with Nessus nasl
Hacking

3 min read


Mar 12, 2020

Ghost Cat Vulnerability In in depth

As we know Ghostcat(CVE-2020–1938) has been a hot issue since last week. It has caught my curiosity regarding the vulnerability. …

Hacking

4 min read

Ghost Cat Vulnerability In in depth
Ghost Cat Vulnerability In in depth
Hacking

4 min read

mucomplex

mucomplex

184 Followers

Security consultant and researcher

Following
  • Eva Rtology

    Eva Rtology

  • Matt Hand

    Matt Hand

  • Vickie Li

    Vickie Li

  • Nasreddine Bencherchali

    Nasreddine Bencherchali

  • Team AV

    Team AV

See all (17)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams