Mayank Malik

ISC2 CC | CRTP | Incident Response | Synack Red Team Member | Threat and Malware Analyst | Security Researcher

Muzaffarnagar, Uttar Pradesh


I am a tech-savvy person, Red Team Enthusiast, and like to wander around to learn new stuff. Malware Analysis, Cryptography, Networking, and System Administration are some of my forte. One of the Founding Members of CTF Team, Abs0lut3Pwn4g3. Apart from the mentioned skills, I’m good at communication skills and am a goal-driven person. Yellow belt holder at pwn.college in pursuit of learning and achieving Blue Belt.


  • Computer Networking
  • Pentesting
  • Threat Hunting
  • Malware Analysis
  • Cryptography
  • Reverse Engineering
  • Exploit Development
  • Hardware


  • School, 2017

    Shardein School

  • B.Sc. (Hons) in Computer Science, 2020

    College of Vocational Studies, University of Delhi


fork() bombing windows

Introduction 💡 DISCLAIMER: The content presented in this write-up is for educational purposes only. It demonstrates concepts related to computer security, system processes, and vulnerabilities. The information provided is not intended to encourage or condone any form of malicious activity. Users are expected to use this knowledge responsibly, ethically, and in compliance with all applicable laws and regulations. The author does not endorse or support any illegal or unauthorized use of the information presented in this write-up.

Thermal Paste Testing

Objective The objective of this thermal paste evaluation was to assess and compare the performance of eight different thermal pastes under controlled testing conditions. The primary focus was to analyze their thermal conductivity, heat dissipation capabilities, and overall effectiveness in final performance available via thermal headroom. By conducting a series of systematic tests, we aimed to provide valuable insights and data-driven recommendations to aid in the selection of the most suitable thermal paste for improving the thermal performance for overall peak performance.

AMD Overclocking and Fan Curve Optimization Guide

What is Overclocking a GPU? Overclocking a GPU refers to the process of increasing its clock speeds beyond the manufacturer’s specified limits. The core clock, memory clock, and sometimes voltage can be adjusted to achieve higher performance levels. Here are the pros and cons of overclocking: Pros: Increased Performance: Overclocking can provide a significant boost in GPU performance, resulting in higher frame rates in games, faster rendering times in creative applications, and improved overall system responsiveness.

AMD Undervolting and Fan Curve Optimization Guide

What is Undervolting a GPU? Undervolting a GPU refers to the process of reducing the default voltage supplied to the graphics processing unit. GPUs are typically set to run at a specific voltage by the manufacturer, but undervolting allows users to lower that voltage while maintaining stable performance. Pros Reduced Power Consumption: Undervolting lowers the voltage supplied to the GPU, resulting in reduced power consumption. This can lead to lower electricity bills and increased energy efficiency, particularly in high-performance systems.

Malware Analysis and Triage : DeathNote Infostealer

1. Executive Summary A. Fingerprinting MD5: 459aad8cc95d9fe2bd1d3199966289f7 SHA256: eb22d542b3b6e69a98801ff7843fa6981b13ca8628a5382cfdc0f713cdb72cba VirusTotal Report: https://www.virustotal.com/gui/file/eb22d542b3b6e69a98801ff7843fa6981b13ca8628a5382cfdc0f713cdb72cba B. Classification Infostealer, used to harvest stored credentials and session objects from browsers installed on the machine. C. Behavioral Summary The malware is a PyInstaller packed executable, with slight obfuscation. When the sample is executed, it extracts the packed Python bytecode, and required libraries into a temporary folder. It then proceeds to spawn a child process by executing itself again, sets/adds the temporary folder into its DLL directories, unpacks and unmarshall the Python bytecode on the fly in the memory.








Linux System Administration

Network Administration

Reverse Engineering

Exploit Development

Google Cloud Platform

Amazon Web Services




Adobe Photoshop

Adobe Premier

Adobe AfterEffects

Adobe Illustrator



Threat Analyst and Incident Response


Nov 2021 – Present Italy

Threat Analyst


Dec 2020 – Nov 2021 India

Security Researcher

Synack Red Team

Dec 2020 – Present India

Founding Member


Oct 2018 – Present India




A SSRF Detection tool to identify web URLs vulnerable to SSRF via HTTP Header Injection.


A data exfiltration server-client app.


A multilevel Data-Encryption Tool.

File Encryptor 1.0

A File Encryption tool written in JAVA

Root The Box framework

A CTF framework(in flask) for HackTheBox style machines.