Hello, I'm

Cyber Threat Intelligence Analyst

Documenting my exploration of malware analysis, reverse engineering, cryptography, and system security through technical writeups and open-source tools.

#threat-hunting
#incident-response
#security-research
#malware-development-series
#dns-security-series

Incoming Transmissions

Recent deep dives, reverse engineering writeups, and technical tutorials.

Read all posts

Part 1 of the CTI Foundations series. Learn what CTI actually is, how the intelligence lifecycle works, and why understanding IOCs, TTPs, and intelligence consumers changes defensive outcomes.

#cti-foundations
#threat-intelligence
#soc
+3

Advanced DNS attack vectors including tunneling, IDN abuse, encrypted DNS protocols, and enterprise security implementation strategies for security analysts.

#dns-security-series
#dns-analysis
#malicious-domains
+3
January 29, 202610 min read

Reversing Golang: A Journey into the Internals

by Mohamed Habib Jaouadi

A deep dive into reverse engineering Go binaries. Learn about Go's internal data structures, compilation flags, PCLNTAB, ABI changes, and how to reconstruct slice and interface operations in IDA Pro.

#reverse-engineering
#golang
#ida-pro
+3
December 28, 202524 min read

The Chomsky Hierarchy and Security: Why Parsers Matter

by Mohamed Habib Jaouadi

A deep dive into formal language theory, automata, and Turing machines and their profound implications for cybersecurity. Learn why regex WAFs fail, how injection attacks exploit parser differentials, and how to apply grammar-based parsing to stealer logs and malware analysis.

#LangSec
#Computer Science
#Blue Team
+5
December 18, 202517 min read

Windows Development with C++: Part 1 - Foundations

by Mohamed Habib Jaouadi

Part 1 of the Windows Development series. Master Win32 API fundamentals, window creation, the message loop, and modern C++ patterns for native Windows programming.

#windows-development-series
#win32-api
#c++
+3
December 14, 202514 min read

Command & Control in 2025: Architecture, Evasion & Operations

by Mohamed Habib Jaouadi

A technical deep dive into modern C2 architecture (Sliver, Havoc), evasion techniques (Shellter Elite, Stack Spoofing, AMSI Blinding), and alternative infrastructure (Discord C2, Cloud Redirectors).

#C2
#Malware Development
#Red Teaming
+3

Establish Connection

Interested in collaboration, discussing security research, or just wanting to connect? My comms are open.