Skip to main content

Blog

This blog is where I document my work, thoughts, and experiments across cybersecurity, reverse engineering, malware analysis, and the occasional hardware rabbit hole. You’ll find technical deep-dives, tooling walkthroughs, cheat sheet updates, and notes from the front lines of SOC operations and malware analysis. Most posts come from real-world experience whether it’s triaging incidents, dissecting malware, or automating the boring stuff.

Windows Registry Cheat Sheet

·343 words·2 mins· loading · loading
Key Windows Registry locations for persistence mechanisms, user activity traces, and IOC hunting in malware analysis and forensic investigations for DFIR professionals.

Windows Log Analysis Cheat Sheet (+ Chainsaw)

·968 words·5 mins· loading · loading
Critical Windows event IDs, logon types, and log locations for threat hunting and incident response, including Security.evtx, PowerShell logs, and Chainsaw analysis techniques.

Malware Analysis Cheat Sheet

·1457 words·7 mins· loading · loading
Comprehensive reference for static and dynamic malware analysis using Ghidra, x64dbg, REMnux, including PDF analysis, unpacking techniques, and reverse engineering workflows. - static-analysis - dynamic-analysis

My Rack Setup - 2020 Extrusion DIY mini-rack

·458 words·3 mins· loading · loading
Build your own compact 10-inch server rack using 2020 aluminium extrusion with detailed parts list, cut measurements, and assembly instructions for a modular homelab setup.