Blog
This blog is where I document my work, thoughts, and experiments across cybersecurity, reverse engineering, threat detection, and the occasional hardware rabbit hole.
You’ll find technical deep-dives, tooling walkthroughs, cheat sheet updates, and notes from the front lines of SOC operations and malware analysis.
Most posts come from real-world experience whether it’s triaging incidents, dissecting malware, or automating the boring stuff.
2025
- A Familiar Crypto Scam Returns — With a More Convincing Face Jul 2
- Sigma Rule Cheat Sheet Jul 2
- Using OpenScanner for IP & Domain Triage Jul 1
- Regex Cheat Sheet Jun 28
- Getting Started in Cyber Security Jun 28
- IP & Domain Investigation Cheat Sheet Jun 27
- MacOS CLI Commands Cheat Sheet Jun 16
- Markdown Cheatsheet Jun 10
- Windows CLI Commands Cheat Sheet Jun 8
- Windows Registry Cheat Sheet Jun 3
- Windows Log Analysis Cheat Sheet (+ Chainsaw) Jun 2
- Malware Analysis Cheat Sheet Jun 2
- My Rack Setup - 2020 Extrusion DIY mini-rack May 28