<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Blog on Ctrl&#43;Alt&#43;Dark</title>
    <link>/posts/</link>
    <description>Recent content in Blog on Ctrl&#43;Alt&#43;Dark</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>james.northey@proton.me (Darkrym)</managingEditor>
    <webMaster>james.northey@proton.me (Darkrym)</webMaster>
    <copyright>© 2026 Darkrym</copyright>
    <lastBuildDate>Tue, 17 Feb 2026 00:00:00 +0000</lastBuildDate><atom:link href="/posts/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Speed vs Depth: The Art of Investigation Theory in the Real World</title>
      <link>/posts/investigation_theory/</link>
      <pubDate>Tue, 17 Feb 2026 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/investigation_theory/</guid>
      <description>Learn to balance speed and thoroughness in MDR investigations using Kill Chain analysis and Likelihood vs Impact matrices to make fast, defensible decisions under pressure.</description>
      
    </item>
    
    <item>
      <title>Learning in the AI Era - Part 3: Practical Workflow with NotebookLM</title>
      <link>/posts/curiosity_crisis_part3/</link>
      <pubDate>Sat, 24 Jan 2026 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/curiosity_crisis_part3/</guid>
      <description>A hands-on guide to using NotebookLM for cybersecurity learning, including how to create study guides, generate flashcards, and build audio podcasts from technical documentation for active learning.</description>
      
    </item>
    
    <item>
      <title>Learning in the AI Era - Part 2: The Learning Cycle</title>
      <link>/posts/curiosity_crisis_part2/</link>
      <pubDate>Fri, 23 Jan 2026 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/curiosity_crisis_part2/</guid>
      <description>Discover evidence-based learning frameworks including the three-phase Learning Cycle (Understanding, Remembering, Focusing) and how to adapt cybersecurity training to your personal learning style with AI.</description>
      
    </item>
    
    <item>
      <title>Learning in the AI Era - Part 1: The Curiosity Crisis</title>
      <link>/posts/curiosity_crisis_part1/</link>
      <pubDate>Thu, 22 Jan 2026 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/curiosity_crisis_part1/</guid>
      <description>AI isn&amp;rsquo;t making us stupider, our curiosity has been atrophying for years and AI just makes it visible. Learn why curiosity is a muscle you can rebuild and how to use AI as an amplifier, not a crutch.</description>
      
    </item>
    
    <item>
      <title>MSSQL Cheat Sheet</title>
      <link>/posts/sql_server_cheatsheet/</link>
      <pubDate>Sun, 21 Dec 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/sql_server_cheatsheet/</guid>
      <description>Microsoft SQL Server forensics and threat hunting guide covering registry paths, log locations, attack indicators, and configuration analysis for compromised SQL Server instances.</description>
      
    </item>
    
    <item>
      <title>PXA Stealers Evolution to PureRAT: Part 6 - Finally, the Final Stage PureRAT (Stage 9)</title>
      <link>/posts/python_malware_part6/</link>
      <pubDate>Wed, 03 Sep 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/python_malware_part6/</guid>
      <description>After nine stages of obfuscation, the final payload reveals itself as PureRAT, a commercial .NET RAT using TLS-pinned C2, Protocol Buffers, and modular plugins for remote access and control.</description>
      
    </item>
    
    <item>
      <title>PXA Stealers Evolution to PureRAT: Part 5 - Another Shift in Tactics (Stage 8)</title>
      <link>/posts/python_malware_part5/</link>
      <pubDate>Tue, 02 Sep 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/python_malware_part5/</guid>
      <description>Advanced .NET loader dynamically loads assemblies from memory, decrypts payloads on-the-fly, and invokes methods without touching disk, requiring a pivot from static to dynamic analysis techniques.</description>
      
    </item>
    
    <item>
      <title>PXA Stealers Evolution to PureRAT: Part 4 - .NET Payload Analysis (Stage 6 &amp; 7)</title>
      <link>/posts/python_malware_part4/</link>
      <pubDate>Mon, 01 Sep 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/python_malware_part4/</guid>
      <description>The campaign shifts from Python to compiled .NET executables using process hollowing for in-memory PE injection, AMSI patching, and ETW unhooking to evade detection and establish persistence.</description>
      
    </item>
    
    <item>
      <title>PXA Stealers Evolution to PureRAT: Part 3 - Weaponised Python Stage (Stage 5)</title>
      <link>/posts/python_malware_part3/</link>
      <pubDate>Sun, 31 Aug 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/python_malware_part3/</guid>
      <description>Dissect PXA Stealer&amp;rsquo;s weaponized info-stealing payload that extracts Chrome credentials, cookies, and 2FA tokens using WMI for AV enumeration before exfiltrating everything via Telegram&amp;rsquo;s Bot API.</description>
      
    </item>
    
    <item>
      <title>PXA Stealers Evolution to PureRAT: Part 2 - In-Memory Python Loading (Stages 3 &amp; 4)</title>
      <link>/posts/python_malware_part2/</link>
      <pubDate>Sat, 30 Aug 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/python_malware_part2/</guid>
      <description>Learn to disassemble Python bytecode and reconstruct custom hybrid encryption loaders as PXA Stealer uses multi-layered in-memory execution, registry persistence, and Telegram C2 to evade detection.</description>
      
    </item>
    
    <item>
      <title>PXA Stealers Evolution to PureRAT: Part 1 - Basics of Python Reversing &amp; Static Analysis (Stage 1 &amp; 2)</title>
      <link>/posts/python_malware_part1/</link>
      <pubDate>Fri, 29 Aug 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/python_malware_part1/</guid>
      <description>Uncover how a copyright phishing email delivers multi-stage Python malware through DLL sideloading, hidden archives, and Base64 obfuscation in this deep-dive intro to Python malware reverse engineering.</description>
      
    </item>
    
    <item>
      <title>Sigma Rule Cheat Sheet</title>
      <link>/posts/sigma_rule_cheatsheet/</link>
      <pubDate>Wed, 02 Jul 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/sigma_rule_cheatsheet/</guid>
      <description>Concise guide for writing Sigma detection rules covering structure, modifiers, best practices, and tools for SOC analysts and detection engineers working with Splunk, Elastic, or LogPoint.</description>
      
    </item>
    
    <item>
      <title>A Familiar Crypto Scam Returns — With a More Convincing Face</title>
      <link>/posts/crypto_scam_returns/</link>
      <pubDate>Wed, 02 Jul 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/crypto_scam_returns/</guid>
      <description>A polished YouTube video promoting a fake TradingView AI feature nearly fooled security analysts with professional branding and clever social engineering, delivering NetSupport RAT through PowerShell to target crypto wallets.</description>
      
    </item>
    
    <item>
      <title>Using NetTriage for IP &amp; Domain Triage</title>
      <link>/posts/openscanner/</link>
      <pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/openscanner/</guid>
      <description>Automate IP and domain investigations with NetTriage, a Python tool that performs reputation lookups, DNS resolution, WHOIS checks, and passive DNS analysis for rapid threat triage.</description>
      
    </item>
    
    <item>
      <title>Getting Started in Cyber Security</title>
      <link>/posts/cyber_security_beginner_guide/</link>
      <pubDate>Sat, 28 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/cyber_security_beginner_guide/</guid>
      <description>A comprehensive Australian guide to breaking into cybersecurity, covering red vs blue team paths, practical skills development, certifications, programming projects, and government career opportunities.</description>
      
    </item>
    
    <item>
      <title>MacOS CLI Commands Cheat Sheet</title>
      <link>/posts/macos_terminal_cheatsheet/</link>
      <pubDate>Mon, 16 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/macos_terminal_cheatsheet/</guid>
      <description>Essential macOS Terminal commands for file operations, process management, networking, Homebrew, and security controls like Gatekeeper and SIP for sysadmins and DFIR practitioners.</description>
      
    </item>
    
    <item>
      <title>Markdown Cheatsheet</title>
      <link>/posts/markdown_cheat_sheet/</link>
      <pubDate>Tue, 10 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/markdown_cheat_sheet/</guid>
      <description>Quick reference for Markdown syntax covering headings, formatting, lists, links, code blocks, and tables for documentation and technical writing.</description>
      
    </item>
    
    <item>
      <title>Windows CLI Commands Cheat Sheet</title>
      <link>/posts/windows_powershell_cheatsheet/</link>
      <pubDate>Sun, 08 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/windows_powershell_cheatsheet/</guid>
      <description>Fast-access PowerShell reference for system administration, automation, security auditing, covering file management, networking, scripting, and Winget for IT pros and analysts.</description>
      
    </item>
    
    <item>
      <title>Windows Registry Cheat Sheet</title>
      <link>/posts/windows_registry_cheatsheet/</link>
      <pubDate>Tue, 03 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/windows_registry_cheatsheet/</guid>
      <description>Key Windows Registry locations for persistence mechanisms, user activity traces, and IOC hunting in malware analysis and forensic investigations for DFIR professionals.</description>
      
    </item>
    
    <item>
      <title>Malware Analysis Cheat Sheet</title>
      <link>/posts/malware-analysis-cheat-sheet/</link>
      <pubDate>Mon, 02 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/malware-analysis-cheat-sheet/</guid>
      <description>Comprehensive reference for static and dynamic malware analysis using Ghidra, x64dbg, REMnux, including PDF analysis, unpacking techniques, and reverse engineering workflows. - static-analysis - dynamic-analysis</description>
      
    </item>
    
    <item>
      <title>Windows Log Analysis Cheat Sheet (&#43; Chainsaw)</title>
      <link>/posts/windows_logs_cheatsheet/</link>
      <pubDate>Mon, 02 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/windows_logs_cheatsheet/</guid>
      <description>Critical Windows event IDs, logon types, and log locations for threat hunting and incident response, including Security.evtx, PowerShell logs, and Chainsaw analysis techniques.</description>
      
    </item>
    
    <item>
      <title>My Rack Setup - 2020 Extrusion DIY mini-rack</title>
      <link>/posts/my_rack_setup/</link>
      <pubDate>Wed, 28 May 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/my_rack_setup/</guid>
      <description>Build your own compact 10-inch server rack using 2020 aluminium extrusion with detailed parts list, cut measurements, and assembly instructions for a modular homelab setup.</description>
      
    </item>
    
    <item>
      <title>Regex Cheat Sheet</title>
      <link>/posts/regex_cheatsheet/</link>
      <pubDate>Sat, 28 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/regex_cheatsheet/</guid>
      <description>Essential regex patterns for matching, capturing, and string manipulation adapted for security analysts, blue teamers, and SOC professionals working with detection rules.</description>
      
    </item>
    
    <item>
      <title>IP &amp; Domain Investigation Cheat Sheet</title>
      <link>/posts/ip_domain_investigation_cheat-sheet/</link>
      <pubDate>Fri, 27 Jun 2025 00:00:00 +0000</pubDate>
      <author>james.northey@proton.me (Darkrym)</author>
      <guid>/posts/ip_domain_investigation_cheat-sheet/</guid>
      <description>Essential techniques for IP and domain investigations including reputation checks, WHOIS lookups, DNS inspection, passive intelligence, and payload retrieval for threat hunting and incident response.</description>
      
    </item>
    
  </channel>
</rss>
