You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
BAY
A computer club active in CTF and creating content related to cyber security field on medium.
Welcome to Bread & Yolk (BAY) where innovation meets cybersecurity excellence. Established in 2022 in Jakarta, Indonesia, BAY is a dynamic cybersecurity collective dedicated to advancing the field through cutting-edge projects, impactful educational initiatives, and community engagement.
At BAY, we specialize in providing vendor services for Capture The Flag (CTF) challenges and competitions, leveraging our technical expertise to design intricate and high-quality scenarios that test and enhance the skills of cybersecurity professionals and enthusiasts alike. Our Jeopardy-style CTF competitions serve as a collaborative platform, fostering skill development and camaraderie within the global cybersecurity community.
Beyond challenges, we are committed to empowering blue teams through innovative malware development and solutions for cyber defense. These projects simulate real-world attack scenarios, enabling organizations to evaluate their detection capabilities, enhance incident response workflows, and strengthen SOC operations.
To further our mission, we share insights through Medium by creating articles on cybersecurity.
Key Focus Areas:
Blue Anvil Projects – Developing malware and solutions to support cyber defense and SOC evaluations.
CTF Challenges & Competitions – Acting as a vendor to design and host engaging Jeopardy-style events for skill-building and community growth.
Knowledge Sharing – Publishing comprehensive articles on cybersecurity topics via Medium to educate and inspire.
Our Projects
Blue Anvil Projects
Plaguards: Open Source PowerShell Deobfuscation and IOC Detection Engine for Blue Teams.
Plaguards is a cutting-edge security tool built to streamline and automate the deobfuscation of obfuscated PowerShell scripts, empowering security teams to rapidly identify Indicators of Compromise (IOCs) and determine whether they represent valid threats (VT) or false positives (FP). Each analysis is documented in a comprehensive PDF report, designed to provide deep insights and actionable intelligence.
As a web app, Plaguards offers users the flexibility to conduct powerful, on-demand analysis from anywhere, at any time, making it invaluable to blue teams tasked with responding to complex malware threats. This innovation not only accelerates workflows but also enhances detection accuracy, positioning Plaguards as a vital asset in proactive threat response.
JARY is a runtime for creating .jary rules to search and correlate log data from external sources. It allows users to define structured rules that filter, match, and analyze log entries to support data analysis and automation. The JARY runtime is a lightweight library written in C that can be dynamically linked with other programs. It provides functions to compile JARY rules, feed data into the runtime, and execute the rules, all accessible from a single library through function calls. The .jary rule syntax is derived from the YARA language developed by VirusTotal.
Kegembok is a Ransomware tools, a cross-platform (Linux, Mac, and Windows) ransomware made from the Golang programming language, encryption using AES-256-GCM, in this program you can use your own key. This program is for educational purposes only and helpful for simulation like tabletop or ransomware test.
Cyberyolk CTF 2023 (Our First Campus CTF with National Standard Challenges)
The CTF lab at Cyberyolk is designed with national standards in mind. Each challenge in the lab is crafted by experienced problem creators, ensuring engaging and relevant challenges in today’s cybersecurity landscape.
This CTF follows a Jeopardy theme, featuring a variety of categories including Binary Exploitation, Cryptography, Computer Forensics, OSINT, Reverse Engineering, and Web Exploitation. With this theme and range of categories, participants have the opportunity to sharpen diverse technical skills in cybersecurity.
In addition to the exciting competition experience, Cyberyolk also offers attractive incentives for participants. Prizes will be awarded to those who secure positions 1, 2, and 3 as an added motivation to strive harder. Winners will also receive an e-certificate as a prestigious acknowledgment they can add to their portfolio.