Hello, I'm

Cyber Threat Intelligence Analyst

Documenting my exploration of malware analysis, reverse engineering, cryptography, and system security through technical writeups and open-source tools.

#incident-response
#threat-hunting
#security-research
#malware-development-series
#internals

Incoming Transmissions

Recent deep dives, reverse engineering writeups, and technical tutorials.

Read all posts

A deep technical analysis of SaltStack. Understand its dual nature as an execution engine and state manager, explore the ZeroMQ event bus, and see how it enables rapid incident response.

#infrastructure-as-code
#saltstack
#devops
+3

A practical introduction to Security Onion, explaining how it combines network security monitoring, log management, and threat hunting into a coherent blue team platform.

#security-onion
#nsm
#siem
+6

Part 1 of the CTI Foundations series. Learn what CTI actually is, how the intelligence lifecycle works, and why understanding IOCs, TTPs, and intelligence consumers changes defensive outcomes.

#cti-foundations
#threat-intelligence
#soc
+3

Advanced DNS attack vectors including tunneling, IDN abuse, encrypted DNS protocols, and enterprise security implementation strategies for security analysts.

#dns-security-series
#dns-analysis
#malicious-domains
+3
January 29, 202610 min read

Reversing Golang: A Journey into the Internals

by Mohamed Habib Jaouadi

A deep dive into reverse engineering Go binaries. Learn about Go's internal data structures, compilation flags, PCLNTAB, ABI changes, and how to reconstruct slice and interface operations in IDA Pro.

#reverse-engineering
#golang
#ida-pro
+3
December 28, 202524 min read

The Chomsky Hierarchy and Security: Why Parsers Matter

by Mohamed Habib Jaouadi

A deep dive into formal language theory, automata, and Turing machines and their profound implications for cybersecurity. Learn why regex WAFs fail, how injection attacks exploit parser differentials, and how to apply grammar-based parsing to stealer logs and malware analysis.

#LangSec
#Computer Science
#Blue Team
+5

Establish Connection

Interested in collaboration, discussing security research, or just wanting to connect? My comms are open.