Skip to content
@baycysec

BAY Cyber Security

A cybersecurity firm offering CTF vendor solutions, publishing blogs, and developing malware for blue-teaming.

banner-23

About BAY

Bread & Yolk (BAY) is a cybersecurity research group founded in 2022 in Jakarta, Indonesia. We combine business innovation with community-driven research, education, and collaboration to advance the security field.

Our work is divided into two main service areas:

  • Blue Anvil — delivering DFIR exercise, tabletop exercises, and cyber drills to help organizations assess and strengthen their resilience.
  • Hacksmiths — providing high-quality Capture The Flag (CTF) challenges and event support for learning, training, and competition.

Beyond services, BAY actively contributes to the global security community through:

  1. Presentations at international conferences such as Black Hat.
  2. Development of DFIR tools and malware simulation projects for defensive testing.
  3. Publishing educational articles and research on Medium.

BAY exists to support and empower the cybersecurity community. We are driven not by profit, but by purpose — fostering collaboration, education, and innovation in an ever-evolving threat landscape.

Our Projects

1. Plaguards: Open Source PowerShell Deobfuscation and IOC Detection Engine for Blue Teams.

PlaguardsBanner

Note

Developed by: jon-brandy | LS | Q

Github Page: Plaguards

Plaguards is a powerful security tool that automates deobfuscation of obfuscated PowerShell scripts, helping teams quickly identify Indicators of Compromise (IOCs) and distinguish valid threats from false positives. Each analysis produces a detailed PDF report with actionable insights.

As a web app, Plaguards enables flexible, on-demand analysis from anywhere, making it invaluable for blue teams handling complex malware. It supports DFIR by improving investigation scope and attribution, efficiently processing large volumes of data to reveal malware TTPs and guide analysts to key artifacts—speeding up root cause analysis.

For SOC teams, Plaguards reduces response time to critical alerts by quickly deobfuscating suspicious scripts, allowing faster investigation and enriched alert reports with IOC lookups, helping meet tight SLA requirements.

Schedule Details
image image
image image

2. JARY: A Modular Data Correlation Engine

Black Hat Arsenal

Note

Developed by: CTRLRLTY

Github Page: JARY

JARY is a runtime for creating .jary rules to search and correlate log data from external sources. It allows users to define structured rules that filter, match, and analyze log entries to support data analysis and automation. The JARY runtime is a lightweight library written in C that can be dynamically linked with other programs. It provides functions to compile JARY rules, feed data into the runtime, and execute the rules, all accessible from a single library through function calls. The .jary rule syntax is derived from the YARA language developed by VirusTotal.

Schedule Details
image image

3. Kegembok: A Golang-Based Ransomware for Blue Team Simulation

kegembok_logo

Note

Developed by: dwiyantech

Github Page: Kegembok

Kegembok is a Ransomware tools, a cross-platform (Linux, Mac, and Windows) ransomware made from the Golang programming language, encryption using AES-256-GCM, in this program you can use your own key. This program is for educational purposes only and helpful for simulation like tabletop or ransomware test.

4. HolmesGeo: A Simple Tool for IP Geolocation Check.

holmes-geo-banner

License IP Geolocation Check CSV-EXCEL IP-based threat attribution tool Plaguards Module

Note

Developed by: jon-brandy

Github Page: HolmesGeo

HolmesGeo is an open-source Python tool designed for extracting and analyzing IP addresses from various data sources. It supports input from Apache log files, CSV files, and standard input, and provides geographic and network information for each IP address. The tool can generate reports in CSV and Excel formats, making it useful for tasks such as geolocation analysis and network diagnostics. HolmesGeo is modular and can be extended to support additional data sources and formats.

5. Sigurd: Operation Baby Steps

sgrd

Note

Developed by: jon-brandy

Github Page: Sigurd

Sigurd is a research-focused artifact used for digital forensics, incident response training, and CTF challenges. It exhibits advanced threat behaviors, including remote command execution, file encryption, data exfiltration, Windows persistence, and stealth techniques. Its first public sample on VirusTotal provides a historical reference for analysts.


Cyberyolk CTF 2023 (Our First Campus CTF with National Standard Challenges)

The CTF lab at Cyberyolk is designed with national standards in mind. Each challenge in the lab is crafted by experienced problem creators, ensuring engaging and relevant challenges in today’s cybersecurity landscape.

This CTF follows a Jeopardy theme, featuring a variety of categories including Binary Exploitation, Cryptography, Computer Forensics, OSINT, Reverse Engineering, and Web Exploitation. With this theme and range of categories, participants have the opportunity to sharpen diverse technical skills in cybersecurity.

In addition to the exciting competition experience, Cyberyolk also offers attractive incentives for participants. Prizes will be awarded to those who secure positions 1, 2, and 3 as an added motivation to strive harder. Winners will also receive an e-certificate as a prestigious acknowledgment they can add to their portfolio.

The Creator CBY Mascot
Appreciation Post for All the Challenge Author Lab & Competition Poster
Banner Scoreboard for Top 10 Users
Dashboard Challs Page
Awarding Announcement for the Winner Cyberyolk Broadcast at BINUS News

Article Name Channel Link to Article
Detection of Audio Attacks (Deepfake) Using Time-Based and Cepstral Domain Features with Stacking Classifier IEEE LINK

Pinned Loading

  1. plaguards plaguards Public

    Plaguards: Open Source PowerShell Deobfuscation and IOC Detection Engine for Blue Teams. [Presented at Black Hat Asia and USA 2025 Arsenal]

    Python 16 4

  2. JARY JARY Public

    Forked from CTRLRLTY/JARY

    An opinionated extensible language for rule creation! [Presented at Black Hat Asia 2025 Arsenal]

    C

  3. HolmesGeo HolmesGeo Public

    Forked from jon-brandy/HolmesGeo

    A simple, modular tool for extracting and analyzing IP addresses from multiple sources.

    Python

  4. kegembok kegembok Public

    Forked from DwiyanTech/kegembok

    Ransomware Golang for Educational Purposes Only, This program helpful for simulation like tabletop or Ransomware Test

    Go 1

  5. sigurd sigurd Public

    Sigurd is a research-oriented malware sample, specifically a Remote Access Trojan (RAT), used to support digital forensics, incident response training, and CTF-style forensic challenges.

Repositories

Showing 7 of 7 repositories

Top languages

Loading…

Most used topics

Loading…