> ./initiate_sequence
> Target: Unknown
> Status: Monitoring...
[!] The content within operates on the edge of the kernel.
[!] Focus:
+ 0x01: Synthetic Execution (Dev)
+ 0x02: Behavioral Heuristics (Analysis)
+ 0x03: Isolation Chambers (Sandbox)
+ 0x04: Mathematical Proofs (Crypto)
Proceed with caution.
-
✍️ Writing at kanaksasak.medium.com
-
✍️ Writing at blog.intellibron.io
- Malware Development - Learn malware by developing it
- Supply Chain Attacks - Analyzing and simulating dependency-based attack vectors
- Malware Sandbox Development - Building isolated environments for safe malware analysis
- Cryptographic Security - Searchable encryption and secure data structures
- Cyber Threat Research - Behavioral analysis and detection engineering
Research implementation of searchable symmetric encryption algorithms in Go.
- Focus: Cryptographic security and privacy
- Application: Secure encrypted data search on blockchain network
- Language: Go (100%)
- THREAT HUNTING: MALWARE ANALYSIS (Supply Chain Attack) (2025) - Merdeka Siber - link
- Malware Analysis 101 (2025) - Cybersecurity Community - slide
- Shellcode Analysis (2025) - 24th Cyber Defense Community Meetup - slide
- Malware On Blockchain (2024) - Lombok Dev Meetup - slide
🔍 Active Repositories: 77
📝 Medium Articles Published: [Check blog]
🛡️ Security Tools Released: 3+
⭐ GitHub Stars: 48
👥 Research Collaborations: ITSEC-Research
I'm interested in collaborating on:
- Open-source security tools
- Malware analysis research
- Supply chain security initiatives
- Cryptographic protocol research
- Security automation projects
⭐ If you find my research valuable, consider starring my repositories!
Building a safer digital world through open security research
Programming is Art ⚛️
