Blog
This blog is where I document my work, thoughts, and experiments across cybersecurity, reverse engineering, threat detection, and the occasional hardware rabbit hole.
You’ll find technical deep-dives, tooling walkthroughs, cheat sheet updates, and notes from the front lines of SOC operations and malware analysis.
Most posts come from real-world experience whether it’s triaging incidents, dissecting malware, or automating the boring stuff.
2025
- PXA Stealers Evolution to PureRAT: Part 6 - Finally, the Final Stage PureRAT (Stage 9) Sep 3
- PXA Stealers Evolution to PureRAT: Part 5 - Another Shift in Tactics (Stage 8) Sep 2
- PXA Stealers Evolution to PureRAT: Part 4 - .NET Payload Analysis (Stage 6 & 7) Sep 1
- PXA Stealers Evolution to PureRAT: Part 3 - Weaponised Python Stage (Stage 5) Aug 31
- PXA Stealers Evolution to PureRAT: Part 2 - In-Memory Python Loading (Stages 3 & 4) Aug 30
- PXA Stealers Evolution to PureRAT: Part 1 - Basics of Python Reversing & Static Analysis (Stage 1 & 2) Aug 29
- A Familiar Crypto Scam Returns — With a More Convincing Face Jul 2
- Sigma Rule Cheat Sheet Jul 2
- Using NetTriage for IP & Domain Triage Jul 1
- Regex Cheat Sheet Jun 28
- Getting Started in Cyber Security Jun 28
- IP & Domain Investigation Cheat Sheet Jun 27
- MacOS CLI Commands Cheat Sheet Jun 16
- Markdown Cheatsheet Jun 10
- Windows CLI Commands Cheat Sheet Jun 8
- Windows Registry Cheat Sheet Jun 3
- Windows Log Analysis Cheat Sheet (+ Chainsaw) Jun 2
- Malware Analysis Cheat Sheet Jun 2
- My Rack Setup - 2020 Extrusion DIY mini-rack May 28