Computer Enthusiast focused on DFIR & TH & OPSEC



ℹ️
Note: Some posts are still in progress. Explanations or code may be updated.


Chaos-Based-Encryption Saga

Learn what is Chaos-Based-Encryption (CBE in forwards), how it works, real examples. How to create your own CBE, Bypasssing EDR with this cipher, and more!

Read more →

WinInt Compilation

WinInt stands for Windows Internals, a recopilation of blogs that I will be creating focused on windows reversing, anti-virus bypass and some kernel exploiting in HEVD.

Read more →

Virtual Machine (Reversing x86)

A small challenge with a virtualized function. It is not designed to be overly difficult. Instead, it is designed to give you something simple to practice on. No fancy dynamic obfuscations or static analysis protections -- just the VM. There is no flag, just working input and non-working input.

Read more →

Manually Unpacking UPX | PE & PE+ (x86/x64 Tips)

In this mini-post, we will learn how packers like upx works and differents ways to unpack them, focusing in PE/PE+ windows binaries. Learning new concepts such as Thunk, FThunk, IAT and new x32 assembly instructions and their possible variant in x64 architecture (pusha, pushad, popa, popad). All of this applying tools such as x32dbg, x64dbg, IDA Pro, Detect It Easy, Scylla v0.9.8 and more!

Read more →

Bringing CyberChef to Localhost

In this section, I’m sharing CyberChef v10.19.4, packaged as a desktop app powered by Electron 37.2.6. You can use the tool without an internet connection or a web browser — convenient, fast, and efficient.

Read more →

WHY2025 CTF | Full Forensics + Reversing Bonus

Get ready to hack! The CTF is back at WHY2025! Brought to you by the same team behind the legendary CTFs at OHM2013, SHA2017, and MCH2022. After a well-earned break, we’re back—bigger, better, and more challenging than ever! Just like in 2022, we will have both online and on-site challenges, making the CTF accessible to everyone. Whether you’re a seasoned hacker or a total beginner, there’s a challenge waiting for you. For event info go to https://why2025.org/

Read more →

L3akCTF 2025 (Post Mortem) | Full Forensics

L3akCTF is an international online cybersecurity competition hosted by the L3ak team. The event runs from Friday, July 11th, 2025 at 17:00 UTC to Sunday, July 13th, 2025 at 17:00 UTC. This jeopardy-style CTF features a wide range of challenges designed for all skill levels, from beginners to seasoned experts. Participants will tackle over 60 carefully crafted challenges across 10 categories, including cryptography, web exploitation, reverse engineering, binary exploitation, forensics, OSINT, mobile security, hardware/RF, hash cracking, and miscellaneous topics.

Read more →

TJCTF 2025 | 7/8 Forensics

TJCTF is an international cybersecurity competition hosted by TJCSC, a group of students from Thomas Jefferson High School for Science and Technology in Northern Virginia. The competition consists of a variety of computer science and cybersecurity challenges in an online, jeopardy-style format. You’ll earn points through solving challenges in categories such as binary exploitation, reverse engineering, cryptography, and web. For more information, please join our Discord to learn more about the competition and get notified when the event nears!

Read more →