Trolling & tracing a Scammer via TwitterI came across a comment on David Walsh tweet about Metamask and his project. It was from a “Metamask” | Official Support”!! ROFL. I didn’t…Nov 2, 2021Nov 2, 2021
How can a illegitimate access to cPanal be abused?Hackers find various ways to abuse. cPanal is the dashboard for the users to control overall domain. Illegitimate access to such critical…Oct 23, 2021Oct 23, 2021
O365 phishing kit analysisLet me tell you a short story about O365 phishing that was hosted on one of the TLD for Nepal🇳🇵 which apparently wants to know the…Feb 8, 2021Feb 8, 2021
Static Analysis: Emotet in NepalSo this morning, I saw a post from hiro_ of an Emotet doc in Nepali. Being a Nepali Security Researcher I was very keen to look at it. So…Sep 1, 2020Sep 1, 2020
HackTheBox: Baby RE with IDEThe COVID19 situation has made everyone depressed. I was in no different phase. Lock-down v1.0 went quite depressing but the new version…Aug 30, 20201Aug 30, 20201
Nepal Based Emotet CampaignIn this basic analysis, I will be taking references from one of the trusted feed source, URLHaus. This feed provides the malware and its…Jan 22, 2020Jan 22, 2020
The story behind the “blank card”There are different ways to cash out an ATM without damage it physically, but it all resumes to one thing A MALWARE, a little virus that…Sep 24, 2019Sep 24, 2019
How I got banned from using Threat Intel APIs?Cyber Threat Intelligence uses its analytics to provide the information of potentials and recent attacks on any organizations that has its…Dec 14, 2018Dec 14, 2018