🐳
Swayam's Blog
LinkedinGithub
  • 🫚root@Swayam's Blog
  • πŸ•ΊAbout Me
  • πŸ› οΈProjects
    • CurveLock
    • ShadowChain
  • 🐞Malware Analysis
    • Basic Malware Analysis
      • LAB Network Setup
      • Basic Static Analysis
      • Basic Dynamic Analysis
      • Advanced Dynamic Analysis
      • Advanced Static Analysis
      • Identifying Anti analysis techniques
      • Binary Patching
      • Shellcode Analysis
      • Malware.unknown.exe.Malz
      • Challenge-Sillyputty
      • Bind_shell RAT Analysis
      • Malicious Powershell Script
      • Malicious HTA(HTML Applications)
      • Phishing Excel Embedded Malware
      • Reversing Csharp And DotNET Framework
      • YARA rules
      • Automating Malware Analysis
    • MASM 64 Bit Assembly
      • Hello World Of Assembly Language
      • Computer Data Representation and Operations
      • Memory Access And Organization
      • Constants, Variables And Data Types
      • Procedures
  • πŸ‘¨β€πŸ’»Malware/Exploit Development
    • Driver Development
      • Driver 101
      • Kernel Calbacks
      • Process Protection
      • Process Token Privilege
  • πŸ“–Notes And Cheatsheets
    • OSCP / Application Security
      • OS stuff
        • Footprinting
        • Nmap
        • Shells
        • Metasploit
        • Windows Buffer Overflow
        • Windows
        • Windows Privilege Escalation
        • Linux Commands
        • Linux Privilege Escalation
        • Password Cracking
        • Pivoting And Tunneling
        • Macos
      • General Introduction
        • Basic Tools
        • Basic Networking
      • WebApps
        • Attacking Common Applications
        • Attacking Common Services
        • Broken Authentication
        • Burp Proxy
        • Common Apps
        • Command Injection
        • ffuf Fuzzing
        • File Inclusion
        • File Transfer
        • File Upload
        • Javascript Deobfuscation
        • Password Attacks
        • SQLi
        • Web attacks
        • Web Information Gathering
        • Wordpress
        • Brute Forcing
        • HTTP Curl
      • Active Directory
    • Wireless Attacks
    • Red Teaming
    • BloodHound
    • Pentesting
    • ADCS
  • 🚩CTFs
    • Google CTF
Powered by GitBook

root@Swayam's Blog

The land of broken code, cursed binaries, and unholy system calls.

NextAbout Me

Last updated 5 days ago

πŸ‘¨β€πŸ’» Who am I?

I'm an aspiring reverse engineer and malware analyst with a deep interest in offensive security. You’ll usually find me dissecting binaries, experimenting with evasion techniques, and running debuggers at questionable hours of the night (often fueled by caffeine).

🚩 What’s here?

  • 🧠 Unhinged Projects – ECC ransomware for "educational purposes only."

  • πŸ•³ Blog Posts – Deep dives into malware techniques like LSASS, AMSI bypassing, and why nothing in Windows is sacred.

  • πŸ§ͺ Malware Analysis – I analyze things that make EDRs (and myself) cry.

  • πŸ“š My Notes – Now hosted on Gitbook for your convenience.

But in all seriousness, I intend to make this site as an archive of sorts... which showcases both my work and notes.

If you want to know more about me, visit my page

🫚
"About Me"