Hello, I'm
Cyber Threat Intelligence Analyst
Documenting my exploration of malware analysis, reverse engineering, cryptography, and system security through technical writeups and open-source tools.
Incoming Transmissions
Recent deep dives, reverse engineering writeups, and technical tutorials.
CTI Foundations: Part 1 - What Cyber Threat Intelligence Is and Why It Matters
Part 1 of the CTI Foundations series. Learn what CTI actually is, how the intelligence lifecycle works, and why understanding IOCs, TTPs, and intelligence consumers changes defensive outcomes.
DNS Security Analysis Series: Part 3 - Advanced Attack Techniques and Modern DNS Challenges
Advanced DNS attack vectors including tunneling, IDN abuse, encrypted DNS protocols, and enterprise security implementation strategies for security analysts.
A deep dive into reverse engineering Go binaries. Learn about Go's internal data structures, compilation flags, PCLNTAB, ABI changes, and how to reconstruct slice and interface operations in IDA Pro.
The Chomsky Hierarchy and Security: Why Parsers Matter
A deep dive into formal language theory, automata, and Turing machines and their profound implications for cybersecurity. Learn why regex WAFs fail, how injection attacks exploit parser differentials, and how to apply grammar-based parsing to stealer logs and malware analysis.
Windows Development with C++: Part 1 - Foundations
Part 1 of the Windows Development series. Master Win32 API fundamentals, window creation, the message loop, and modern C++ patterns for native Windows programming.
Command & Control in 2025: Architecture, Evasion & Operations
A technical deep dive into modern C2 architecture (Sliver, Havoc), evasion techniques (Shellter Elite, Stack Spoofing, AMSI Blinding), and alternative infrastructure (Discord C2, Cloud Redirectors).





