Hello, I'm

Cyber Threat Intelligence Analyst

Documenting my exploration of malware analysis, reverse engineering, cryptography, and system security through technical writeups and open-source tools.

#incident-response
#threat-hunting
#security-research
#malware-development-series
#cti-foundations

Incoming Transmissions

Recent deep dives, reverse engineering writeups, and technical tutorials.

Read all posts
May 19, 202622 min read

CTI Foundations: Part 2 - The Threat Intelligence Pyramid

by Mohamed Habib Jaouadi

Part 2 of the CTI Foundations series. Understand the Pyramid of Pain framework: why hash values are trivial to evade, how infrastructure rotates, and why TTPs are the most durable indicators of compromise.

#cti-foundations
#threat-intelligence
#pyramid-of-pain
+3

A deep technical analysis of SaltStack. Understand its dual nature as an execution engine and state manager, explore the ZeroMQ event bus, and see how it enables rapid incident response.

#infrastructure-as-code
#saltstack
#devops
+3

A practical introduction to Security Onion, explaining how it combines network security monitoring, log management, and threat hunting into a coherent blue team platform.

#security-onion
#nsm
#siem
+6

Part 1 of the CTI Foundations series. Learn what CTI actually is, how the intelligence lifecycle works, and why understanding IOCs, TTPs, and intelligence consumers changes defensive outcomes.

#cti-foundations
#threat-intelligence
#soc
+3

Advanced DNS attack vectors including tunneling, IDN abuse, encrypted DNS protocols, and enterprise security implementation strategies for security analysts.

#dns-security-series
#dns-analysis
#malicious-domains
+3
January 29, 202610 min read

Reversing Golang: A Journey into the Internals

by Mohamed Habib Jaouadi

A deep dive into reverse engineering Go binaries. Learn about Go's internal data structures, compilation flags, PCLNTAB, ABI changes, and how to reconstruct slice and interface operations in IDA Pro.

#reverse-engineering
#golang
#ida-pro
+3

Establish Connection

Interested in collaboration, discussing security research, or just wanting to connect? My comms are open.