0xHabib
Hi, I'm Mohamed Habib Jaouadi
Welcome to my cybersecurity learning journey! This blog documents my exploration of malware analysis, reverse engineering, cryptography, and system security through practical examples, interactive visualizations, and hands-on tutorials.
Latest Posts
Deep dives into cybersecurity research and tool building
A deep dive into reverse engineering Go binaries. Learn about Go's internal data structures, compilation flags, PCLNTAB, ABI changes, and how to reconstruct slice and interface operations in IDA Pro.
The Chomsky Hierarchy and Security: Why Parsers Matter
A deep dive into formal language theory, automata, and Turing machines and their profound implications for cybersecurity. Learn why regex WAFs fail, how injection attacks exploit parser differentials, and how to apply grammar-based parsing to stealer logs and malware analysis.
Windows Development with C++: Part 1 - Foundations
Part 1 of the Windows Development series. Master Win32 API fundamentals, window creation, the message loop, and modern C++ patterns for native Windows programming.
Command & Control in 2025: Architecture, Evasion & Operations
A technical deep dive into modern C2 architecture (Sliver, Havoc), evasion techniques (Shellter Elite, Stack Spoofing, AMSI Blinding), and alternative infrastructure (Discord C2, Cloud Redirectors).
Part 1 of the Windows Protected Processes series. Learn about protected processes, Process Explorer limitations, and why even administrators can't access critical system processes like CSRSS and LSASS.
Advanced inspection techniques with Process Hacker, WinDbg kernel debugging, LSASS credential protection, BYOVD attacks, detection strategies, and system hardening for Windows protected processes.




