0xHabib
HomePostsVisualizationsCheatsheetsNotesStudy DecksAbout

Built with Love. 0xHabib © 2025

Anonymous analytics are collected for performance monitoring and site improvement purposes.

All Posts

10 published posts documenting my journey in cybersecurity and development

Showing all 10 posts

Technical visualization of Command and Control infrastructure
14 min read
December 14, 202514 min read

Command & Control in 2025: Architecture, Evasion & Operations

by Mohamed Habib Jaouadi

A technical deep dive into modern C2 architecture (Sliver, Havoc), evasion techniques (Shellter Elite, Stack Spoofing, AMSI Blinding), and alternative infrastructure (Discord C2, Cloud Redirectors).

#C2
#Malware Development
#Red Teaming
+3
Windows Protected Processes - Security Analysis and Inspection Tools
17 min read
November 22, 202517 min read

Windows Protected Processes Series: Part 1

by Mohamed Habib Jaouadi

Part 1 of the Windows Protected Processes series. Learn about protected processes, Process Explorer limitations, and why even administrators can't access critical system processes like CSRSS and LSASS.

#windows-protected-processes-series
#windows-internals
#process-inspection
+3
Windows Protected Processes Part 2 - Advanced Inspection and Security
33 min read
November 22, 202533 min read

Windows Protected Processes Series: Part 2

by Mohamed Habib Jaouadi

Advanced inspection techniques with Process Hacker, WinDbg kernel debugging, LSASS credential protection, BYOVD attacks, detection strategies, and system hardening for Windows protected processes.

#windows-protected-processes-series
#process-hacker
#windbg
+5
DNS Fundamentals and Security Analysis - DNS Security Series Part 1
20 min read
August 25, 202520 min read

DNS Security Analysis Series: Part 1 - DNS Fundamentals and Architecture

by Mohamed Habib Jaouadi

Deep dive into DNS architecture, record types, resolution process, and security analysis techniques for network defenders and DNS analysts.

#dns-security-series
#dns-analysis
#dns-forensics
+3
Network Architecture and Blue Team Defense Strategies
15 min read
August 7, 202515 min read

Enterprise Network Architecture for Blue Team Operations: Visibility, Segmentation, and Modern Defense Strategies

by Mohamed Habib Jaouadi

A guide to enterprise network architecture for blue team operations.

#blue-team
#network-architecture
#network-security
+5
Malware Development Series Part 3 - Detection and Windows Processes
16 min read
July 27, 202516 min read

Malware Development Series: Part 3

by Mohamed Habib Jaouadi

Detection mechanisms, Windows processes, threads, memory types, and the Process Environment Block (PEB) for security professionals.

#malware-development-series
#malware-detection
#windows-processes
+4
Statistics and Probability for Engineering Benchmarks
17 min read
July 14, 202517 min read

The Statistics You Learned in School but Never Applied

by Mohamed Habib Jaouadi

Bridge the gap between academic statistics and real-world engineering.

#performance
#statistics
#benchmarking
+2
Malware Development Series Part 2 - Memory Management and PE Analysis
18 min read
July 13, 202518 min read

Malware Development Series: Part 2

by Mohamed Habib Jaouadi

Windows memory management, API fundamentals, PE file format, and DLL mechanics for security professionals.

#malware-development-series
#windows-memory
#pe-format
+3
Malware Development Series - Security Research and Analysis
10 min read
July 7, 202510 min read

Malware Development Series: Part 1

by Mohamed Habib Jaouadi

Part 1 of the malware development series. Learn the fundamentals of ethical malware development, Windows architecture, and essential tools for penetration testers and red teams.

#malware-development-series
#ethical-hacking
#red-team
+3
The Enigma Machine
14 min read
July 5, 202514 min read

The Hill Cipher: Linear Algebra Meets Cryptography

by Mohamed Habib Jaouadi

Exploring the Hill cipher, a polygraphic substitution cipher that uses linear algebra and matrix operations for encryption and decryption.

#cryptography
#classical-ciphers
#linear-algebra
+2

Coming Soon5 drafts

These posts are currently in development and will be published soon.

Coming Soon
HTTP Protocol Analysis and Cybersecurity Fundamentals
31 min read
August 13, 202531 min read

HTTP Deep Dive: From Web Fundamentals to Cyber Threat Analysis

by Mohamed Habib Jaouadi

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#http
#webservers
+9
Coming Soon
DNS Security Analysis Part 3 - Malicious Domain Detection and Infrastructure Analysis
20 min read
August 5, 202520 min read

DNS Security Analysis Series: Part 3 - Advanced Attack Techniques and Modern DNS Challenges

by Mohamed Habib Jaouadi

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#dns-security-series
#dns-analysis
+4
Coming Soon
DNS Security Analysis Part 2 - Malicious Domain Detection and Infrastructure Analysis
12 min read
August 4, 202512 min read

DNS Security Analysis Series: Part 2 - Malicious Domain Detection and Infrastructure Analysis

by Mohamed Habib Jaouadi

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#dns-security-series
#dns-analysis
+4
Coming Soon
Malware Development Series Part 4 - Payload Placement and Execution
10 min read
August 3, 202510 min read

Malware Development Series: Part 4

by Mohamed Habib Jaouadi

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#malware-development-series
#payload-placement
+4
Coming Soon
Advanced Secret Sharing Obfuscation Techniques - Mathematical Cryptographic Evasion
22 min read
July 25, 202522 min read

Advanced Obfuscation Techniques: Secret Sharing Schemes in Evasion

by Mohamed Habib Jaouadi

This post is currently being written and will be available soon. Stay tuned for the full content!

Coming Soon
#obfuscation
#secret-sharing
+7