~/darkvoidstudios

DARKVOIDSTUDIOS

Into the Void.

A corner of the internet dedicated to the dark side of computing. Ransomware internals, trojan architectures, OWASP attack vectors, and the code behind the chaos. Not selling anything -- just fascinated by how it all works.

// About

Curious about the dark side of computing

Darkvoidstudios is my space for everything IT security. I'm a software developer who's genuinely fascinated by how threats work -- not to use them, but to understand them. How does ransomware negotiate its keys? Why are trojans so hard to detect? What makes the OWASP Top 10 so persistent?

This site is a collection of the things I dig into: attack vectors, malware internals, exploit techniques, and the code behind all of it. Think of it as a personal research board -- the kind of stuff I read about at 2am because I can't stop pulling at the thread.

I also build things, break things, and occasionally fly FPV drones when I need to touch grass. But mostly it's about the void.

motd.sh

$ cat /etc/motd

Welcome to darkvoidstudios

$ echo $FOCUS

Ransomware | Trojans | OWASP | Exploits

$ echo $MOTTO

"Understand the attack to build the defense"

$ uptime

always online _

> What Fascinates Me

Ransomware Internals

How does ransomware actually encrypt your files? AES-256, RSA key exchange, double extortion -- the engineering behind the destruction.

Trojan Architectures

Process injection, sandbox evasion, persistence mechanisms -- understanding what makes trojans invisible and dangerous.

OWASP Top 10

SQL injection, XSS, SSRF -- not just a checklist but a deep dive into why these attack vectors keep coming back.

Malware Analysis

Reversing binaries, reading disassembly, unpacking obfuscated payloads. Figuring out what malicious code really does.

Exploit Development

Buffer overflows, ROP chains, heap spraying -- the low-level techniques behind real-world exploits.

Digital Forensics

Tracing attack paths through logs, memory dumps, and disk images. Reconstructing what happened after a breach.

> Rabbit Holes

RansomwareTrojansOWASP Top 10Zero-DaysCTF ChallengesSocial EngineeringSupply Chain AttacksExploit DevReverse EngineeringPrivilege EscalationXSSSQL InjectionPhishingRATsC2 FrameworksRootkits
// Threat Landscape

The Stuff That Keeps Me Up at Night

Attack vectors, malware families, and the techniques behind them. This is what I spend my free time reading about and pulling apart.

Ransomware

Ransomware encrypts victim files and demands payment for decryption keys. Modern variants use double extortion -- encrypting data while also exfiltrating it to threaten public leaks.

Known Variants & Examples

WannaCryLockBitREvilContiBlackCat
Threat SeverityCRITICAL
ransomware_analysis.py
1# LockBit 3.0 - actual kill chain observed ITW2# Stage 1: Initial access via Citrix Bleed3# CVE-2023-4966 - session token hijack4curl -s https://vpn.target.com/vpn/../vpns/cfg5  → leaks session cookies (no auth needed)67# Stage 2: Disable defenses before encrypt8cmd> vssadmin delete shadows /all /quiet9cmd> wmic shadowcopy delete10cmd> bcdedit /set {default} recoveryenabled No11reg add HKLM\...\Windows Defender12  /v DisableAntiSpyware /t REG_DWORD /d 11314# Stage 3: AES-256 + RSA-2048 per-file15for f in walk(drives):16    key = os.urandom(32)  # per-file AES key17    encrypt_AES_CBC(f, key)18    append(rsa_encrypt(key, pub_key), f)19    os.rename(f, f + ".lockbit")2021# Stage 4: Double extortion22# "Pay $2M or 4TB hits our leak site"
// Toolkit

What I Work With

Languages, tools, and the security rabbit holes I spend too much time in.

Languages I Use

Python90%
Java85%
C#70%
Dart / Flutter75%
SQL80%
Bash72%

Security Stuff I Dig Into

Ransomware Analysis80%
OWASP Top 1088%
Trojan / RAT Research75%
Web App Pentesting82%
Reverse Engineering65%
Network Recon78%

Tools & Platforms

Wireshark / tcpdump78%
Burp Suite / ZAP80%
Nmap85%
Ghidra60%
Docker75%
Git / GitHub88%

> Also Into

TryHackMeHackTheBoxCTFsPortSwigger LabsFPV DronesGame DevAdvent of Code
// Contact

Say Hello

Want to talk about ransomware internals, share a cool exploit writeup, collaborate on something, or just nerd out about security? Hit me up.

ping.sh

$ ping darkvoidstudios

PING darkvoidstudios.com

64 bytes: seq=1 ttl=64 time=0.42ms

64 bytes: seq=2 ttl=64 time=0.38ms

$ echo $GITHUB

github.com/DanielBecker715

$ echo $STATUS

online _