milann shresthaTrolling & tracing a Scammer via TwitterI came across a comment on David Walsh tweet about Metamask and his project. It was from a “Metamask” | Official Support”!! ROFL. I didn’t…3 min read·Nov 2, 2021----
milann shresthaHow can a illegitimate access to cPanal be abused?Hackers find various ways to abuse. cPanal is the dashboard for the users to control overall domain. Illegitimate access to such critical…3 min read·Oct 23, 2021----
milann shresthaO365 phishing kit analysisLet me tell you a short story about O365 phishing that was hosted on one of the TLD for Nepal🇳🇵 which apparently wants to know the…3 min read·Feb 8, 2021----
milann shresthaStatic Analysis: Emotet in NepalSo this morning, I saw a post from hiro_ of an Emotet doc in Nepali. Being a Nepali Security Researcher I was very keen to look at it. So…4 min read·Sep 1, 2020----
milann shresthaHackTheBox: Baby RE with IDEThe COVID19 situation has made everyone depressed. I was in no different phase. Lock-down v1.0 went quite depressing but the new version…3 min read·Aug 30, 2020--1--1
milann shresthaNepal Based Emotet CampaignIn this basic analysis, I will be taking references from one of the trusted feed source, URLHaus. This feed provides the malware and its…3 min read·Jan 22, 2020----
milann shresthaThe story behind the “blank card”There are different ways to cash out an ATM without damage it physically, but it all resumes to one thing A MALWARE, a little virus that…2 min read·Sep 24, 2019----
milann shresthaHow I got banned from using Threat Intel APIs?Cyber Threat Intelligence uses its analytics to provide the information of potentials and recent attacks on any organizations that has its…3 min read·Dec 14, 2018----