This blog is where I document my work, thoughts, and experiments across cybersecurity, reverse engineering, malware analysis, and the occasional hardware rabbit hole. You’ll find technical deep-dives, tooling walkthroughs, cheat sheet updates, and notes from the front lines of SOC operations and malware analysis. Most posts come from real-world experience whether it’s triaging incidents, dissecting malware, or automating the boring stuff.
Key Windows Registry locations for persistence mechanisms, user activity traces, and IOC hunting in malware analysis and forensic investigations for DFIR professionals.
Critical Windows event IDs, logon types, and log locations for threat hunting and incident response, including Security.evtx, PowerShell logs, and Chainsaw analysis techniques.
Comprehensive reference for static and dynamic malware analysis using Ghidra, x64dbg, REMnux, including PDF analysis, unpacking techniques, and reverse engineering workflows. - static-analysis - dynamic-analysis
Build your own compact 10-inch server rack using 2020 aluminium extrusion with detailed parts list, cut measurements, and assembly instructions for a modular homelab setup.