profile photo of Zhassulan Zhussupov

Zhassulan Zhussupov

Cybersecurity enthusiast | CTF player | R&D Engineer | Jiu-Jitsu Practicioner

Mobile pentesting series part 2: reversing Android application

You may be curious, as a penetration tester, as to how a particular app feature operates or what library it utilizes. Otherwise, you may be interested in the underlying architectures or components of

Mobile Pentesting Series - part 1: bypass SSL pinning in Android

The purpose of this article is to demonstrate how to circumvent SSL pinning on Android.

YARA rules Part 2: Using modules

Let's continue our acquaintance with YARA rules

YARA Part 1: Malware analysis for detecting IOC's

Yara is an instrument used to assist malware researchers in the identification and classification of malware samples.

Malware analysis report: MagicRAT (Lazarus)

MagicRat malware is a remote access trojan (RAT) that is primarily distributed through exploiting vulnerabilities such as Log4j in VMware Horizon. Malware is software that is designed to give its crea

PGP encryption. Practical examples

A simple implementations of PGP encryption in Python

Load More