As a cybersecurity researcher, I specialize in malware development, behavioral malware analysis, malware sandbox development, cryptographic security, and cyber threat analysis.
-
βοΈ Writing at kanaksasak.medium.com
-
βοΈ Writing at blog.intellibron.io
- Malware Development - Learn malware by developing it
- Supply Chain Attacks - Analyzing and simulating dependency-based attack vectors
- Malware Sandbox Development - Building isolated environments for safe malware analysis
- Cryptographic Security - Searchable encryption and secure data structures
- Cyber Threat Research - Behavioral analysis and detection engineering
Understanding offensive techniques to improve defensive capabilities
Research into malware development techniques using Golang to enhance detection, analysis, and prevention strategies for security teams.
Research Focus:
- Modern malware development techniques in Go
- Evasion methods and anti-analysis techniques
- Process injection and memory manipulation
- Command & control (C2) architectures
- Detection bypass strategies
Defensive Value:
- Understand attacker methodologies to build better defenses
- Develop detection signatures and behavioral rules
- Train SOC analysts on emerging threats
- Improve sandbox and EDR evasion detection
- Enhance blue team capabilities
Professional Context: Research conducted under security research capacity at PT ITSEC Asia to advance threat detection and defensive security.
π‘οΈ CupaX Sandbox
Open-source malware analysis sandbox platform
Educational research malware sandbox for safe malware execution and behavioral analysis in isolated Windows environments.
- Architecture: Go backend, Python agent, React/TypeScript frontend
- Features: Behavioral analysis, Proxmox integration, ZIP extraction, API-driven workflow
- Target Users: Security researchers, SOC teams, malware analysts
- Status: Active development | 5-minute quick start
π§ Tech Stack: Go, Python, React, Proxmox, Docker
Educational research on Golang supply chain vulnerabilities
Deliberately crafted malicious package demonstrating supply chain attack vectors in the Go ecosystem.
- Purpose: Security awareness and supply chain attack education
- Technique: Typosquatting and dependency confusion simulation
- Impact: Demonstrates how attackers weaponize legitimate-looking packages
- Defense: Shows detection methodologies and secure dependency management
Research implementation of searchable symmetric encryption algorithms in Go.
- Focus: Cryptographic security and privacy
- Application: Secure encrypted data search on blockchain network
- Language: Go (100%)
- Malware Analysis 101 (2025) - Cybersecurity Community - slide
- Shellcode Analysis (2025) - 24th Cyber Defense Community Meetup - slide
- Malware On Blockchain (2024) - Lombok Dev Meetup - slide
π Active Repositories: 77
π Medium Articles Published: [Check blog]
π‘οΈ Security Tools Released: 3+
β GitHub Stars: 48
π₯ Research Collaborations: ITSEC-Research
I'm interested in collaborating on:
- Open-source security tools
- Malware analysis research
- Supply chain security initiatives
- Cryptographic protocol research
- Security automation projects
β If you find my research valuable, consider starring my repositories!
Building a safer digital world through open security research
Programming is Art βοΈ