0xHabib
Hi, I'm Mohamed Habib Jaouadi
Welcome to my cybersecurity learning journey! This blog documents my exploration of malware analysis, reverse engineering, cryptography, and system security through practical examples, interactive visualizations, and hands-on tutorials.
Latest Posts
Deep dives into cybersecurity research and tool building
Command & Control in 2025: Architecture, Evasion & Operations
A technical deep dive into modern C2 architecture (Sliver, Havoc), evasion techniques (Shellter Elite, Stack Spoofing, AMSI Blinding), and alternative infrastructure (Discord C2, Cloud Redirectors).
Part 1 of the Windows Protected Processes series. Learn about protected processes, Process Explorer limitations, and why even administrators can't access critical system processes like CSRSS and LSASS.
Advanced inspection techniques with Process Hacker, WinDbg kernel debugging, LSASS credential protection, BYOVD attacks, detection strategies, and system hardening for Windows protected processes.
DNS Security Analysis Series: Part 1 - DNS Fundamentals and Architecture
Deep dive into DNS architecture, record types, resolution process, and security analysis techniques for network defenders and DNS analysts.
Enterprise Network Architecture for Blue Team Operations: Visibility, Segmentation, and Modern Defense Strategies
A guide to enterprise network architecture for blue team operations.
Detection mechanisms, Windows processes, threads, memory types, and the Process Environment Block (PEB) for security professionals.




