All Posts

7 published posts documenting my journey in cybersecurity and development

Showing all 7 posts

August 25, 202520 min read

DNS Security Analysis Series: Part 1 - DNS Fundamentals and Architecture

by Mohamed Habib Jaouadi

Deep dive into DNS architecture, record types, resolution process, and security analysis techniques for network defenders and DNS analysts.

#dns-security-series
#dns-analysis
#dns-forensics
+3

A guide to enterprise network architecture for blue team operations.

#blue-team
#network-architecture
#network-security
+5
July 27, 202516 min read

Malware Development Series: Part 3

by Mohamed Habib Jaouadi

Detection mechanisms, Windows processes, threads, memory types, and the Process Environment Block (PEB) for security professionals.

#malware-development-series
#malware-detection
#windows-processes
+4
July 14, 202517 min read

The Statistics You Learned in School but Never Applied

by Mohamed Habib Jaouadi

Bridge the gap between academic statistics and real-world engineering.

#performance
#statistics
#benchmarking
+2
July 13, 202518 min read

Malware Development Series: Part 2

by Mohamed Habib Jaouadi

Windows memory management, API fundamentals, PE file format, and DLL mechanics for security professionals.

#malware-development-series
#windows-memory
#pe-format
+3
July 7, 202510 min read

Malware Development Series: Part 1

by Mohamed Habib Jaouadi

Part 1 of the malware development series. Learn the fundamentals of ethical malware development, Windows architecture, and essential tools for penetration testers and red teams.

#malware-development-series
#ethical-hacking
#red-team
+3
July 5, 202514 min read

The Hill Cipher: Linear Algebra Meets Cryptography

by Mohamed Habib Jaouadi

Exploring the Hill cipher, a polygraphic substitution cipher that uses linear algebra and matrix operations for encryption and decryption.

#cryptography
#classical-ciphers
#linear-algebra
+2

Coming Soon5 drafts

These posts are currently in development and will be published soon.

Coming Soon
August 13, 202531 min read

HTTP Deep Dive: From Web Fundamentals to Cyber Threat Analysis

by Mohamed Habib Jaouadi

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#http
#webservers
+9
Coming Soon

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#dns-security-series
#dns-analysis
+4
Coming Soon

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#dns-security-series
#dns-analysis
+4
Coming Soon
August 3, 202510 min read

Malware Development Series: Part 4

by Mohamed Habib Jaouadi

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#malware-development-series
#payload-placement
+4
Coming Soon
July 25, 202522 min read

Advanced Obfuscation Techniques: Secret Sharing Schemes in Evasion

by Mohamed Habib Jaouadi

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#obfuscation
#secret-sharing
+7