BAY Logo

We Challenge. You Evolve.

About BAY

Welcome to Bread & Yolk (BAY) — a non-profit, community-driven cybersecurity collective based in Jakarta, Indonesia. Since our founding in 2022, BAY has remained committed to advancing the cybersecurity field through collaborative research, practical education, and service to the community.

As a small and passionate group of practitioners, we specialize in offering select services that include hosting Capture The Flag (CTF) competitions, developing cybersecurity tooling under our Blue Anvil Projects initiative, and publishing in-depth cybersecurity articles on Medium.

Our Jeopardy-style CTF challenges are crafted to provide hands-on learning and real-world problem-solving for both aspiring and seasoned professionals. Simultaneously, our Blue Anvil Projects deliver malware simulation and blue team tooling to help organizations test their detection and defense mechanisms.

As a non-commercial initiative, BAY exists to support the global cybersecurity community, driven not by profit, but by purpose. We are always open to collaboration, education, and exploration in the ever-evolving security landscape.

CTF Competitions

Serving as a vendor to design and host engaging Jeopardy-style cybersecurity challenges for hands-on skill development.

Blue Anvil Projects

Developing malware and defensive tools to support cybersecurity research and operations.

Content Writing

Publishing comprehensive cybersecurity articles on Medium to educate and inspire.

CTF Competitions

Our latest work and ongoing developments

Completed
Cyberyolk CTF 2023

The CTF lab at Cyberyolk is designed with national standards in mind. Each challenge in the lab is crafted by experienced problem creators, ensuring engaging and relevant challenges in today’s cybersecurity landscape.

This CTF follows a Jeopardy theme, featuring a variety of categories including Binary Exploitation, Cryptography, Computer Forensics, OSINT, Reverse Engineering, and Web Exploitation. With this theme and range of categories, participants have the opportunity to sharpen diverse technical skills in cybersecurity.

Capture The Flag Jeopardy National Level
In-Progress
Telkom University Gemastik Internal Selection 2025

BAY was outsourced as a challenge vendor for the Telkom University Gemastik Internal Selection 2025, contributing a set of high-quality Capture The Flag (CTF) challenges to support the selection process.

Details coming soon. Currently in progress.

Capture The Flag Jeopardy National Level Internal

Blue Anvil Projects

Our latest work and ongoing developments

Completed
Plaguards: Open Source PowerShell Deobfuscation and IOC Detection Engine for Blue Teams

Plaguards is a powerful security tool that automates deobfuscation of obfuscated PowerShell scripts, helping teams quickly identify Indicators of Compromise (IOCs) and distinguish valid threats from false positives. Each analysis produces a detailed PDF report with actionable insights. As a web app, Plaguards enables flexible, on-demand analysis from anywhere, making it invaluable for blue teams handling complex malware. It supports DFIR by improving investigation scope and attribution, efficiently processing large volumes of data to reveal malware TTPs and guide analysts to key artifacts, speeding up root cause analysis.

Powershell Deobfuscation IOC Checker Automated Reporting Black Hat Asia 2025 Arsenal Black Hat USA 2025 Arsenal
Completed
JARY: A Modular Data Correlation Engine

JARY is a runtime for creating .jary rules to search and correlate log data from external sources. It allows users to define structured rules that filter, match, and analyze log entries to support data analysis and automation. The JARY runtime is a lightweight library written in C that can be dynamically linked with other programs. It provides functions to compile JARY rules, feed data into the runtime, and execute the rules, all accessible from a single library through function calls. The .jary rule syntax is derived from the YARA language developed by VirusTotal.

SOAR Correlation Engine Rule-Based Black Hat Asia 2025 Arsenal
Completed
Kegembok: A Golang-Based Ransomware for Blue Team Simulation

Kegembok is a Ransomware tools, a cross-platform (Linux, Mac, and Windows) ransomware made from the Golang programming language, encryption using AES-256-GCM, in this program you can use your own key. This program is for educational purposes only and helpful for simulation like tabletop or ransomware test.

Golang Ransomware
Completed
HolmesGeo: A Simple Tool for IP Geolocation Check.

HolmesGeo is an open-source Python tool designed for extracting and analyzing IP addresses from various data sources. It supports input from Apache log files, CSV files, and standard input, and provides geographic and network information for each IP address. The tool can generate reports in CSV and Excel formats, making it useful for tasks such as geolocation analysis and network diagnostics. HolmesGeo is modular and can be extended to support additional data sources and formats.

IP Geolocation Checker Tabular File Formats Threat Intelligence Tool
In-Progress
Sigurd: Operation Hollowline

Details coming soon. Currently in progress.

Trojan C2 Python LOLBIN

Content Writing

Insights and thoughts from our team

Detection of Audio Attacks (Deepfake) Using Time-Based and Cepstral Domain Features with Stacking Classifier

Presented at ICODSA 2025 and under review by the IEEE team. Details coming soon.

CyberGonCTF | autoraph (pwn)

Conquering a challenging 64-bit, PIE-enabled binary from CyberGonCTF by leveraging a hidden format-string option in a debug menu to overwrite the Global Offset Table (GOT). The write-up demonstrates how the attacker leaks both PIE and libc addresses via %p format specifiers, computes their respective base addresses, and uses a crafted fmtstr_payload to replace printf@GOT with system—ultimately gaining remote code execution and capturing the flag.

Overcoming ASLR: A Guide to Conquering ret2libc Challenges with PIE

Walks through a practical, step-by-step approach to exploiting a 64‑bit PIE-enabled binary using a ret2libc attack. It starts by identifying key protections (PIE, NX, full RELRO, no canary), then uses a format-string vulnerability to leak both PIE and libc addresses. With those leaks, the attacker computes the respective base addresses, finds necessary gadgets (like pop rdi and ret), and finally crafts a payload to call system("/bin/sh"), successfully spawning a shell. It’s a clear, hands‑on tutorial for bypassing modern memory protections in binary exploitation.

Our Team

Founders of BAY Cyber Security

Team Member
Nicolas Saputra Gunawan

Founder & Blue Anvil Lead

Team Member
Satya Kusuma

Co-Founder & CTF Engineer Lead

Team Member
Rio Ferdinand Vindi Tanius

Co-Founder & Content Writer Lead

Graphic Design Artist

Team Member
Gede Bramanta Pandya Wisesa

2D Artist & Story Writer

Board Members

Team Member
Mikael Wiryamanta Wijaya

Reverse Engineering Lead

Team Member
Jeffrey Jingga

Web Exploitation Lead

Team Member
Chance Edrea

Binary Exploitation Lead

Team Member
Pitra Winarianto

Contributor

Team Member
Bertrand Redondo Mulyono

Contributor

Team Member
Steven Liem

Contributor

Team Member
Antonyous Mikhael Aleksander

Contributor

Team Member
Stephan Chandra

Contributor

Team Member
Vincent Aldiandra

Contributor

Team Member
Calvin Winata

Contributor

Team Member
Antonio Fandako

Contributor

Team Member
Muhammad Raznan

Contributor

Team Member
Ahmad Dwiyan Anugrah Putra

Contributor

Team Member
Matthew Kurniawan

Contributor

Team Member
Benedicto Marvelous Alidajaya

Contributor

Team Member
Achmad Daffa Fazli

Contributor