0xHabib
HomePostsVisualizationsCheatsheetsNotesStudy DecksAbout

Built with Love. 0xHabib © 2025

Anonymous analytics are collected for performance monitoring and site improvement purposes.

COMING SOON: This post is currently being written and will be available soon!
Malware Development Series Part 4 - Payload Placement and Execution

Malware Development Series: Part 4

Advanced payload placement techniques in PE sections, resource management, and shellcode execution strategies for security professionals.

byMohamed Habib Jaouadi
#malware-development-series
#payload-placement
#pe-sections
#shellcode-execution
#resource-management
#security-research
Malware Development Series
Part 4 of 4
Series Progress100%
Previous: Malware Development Series: Part 3

Read Also

Security Onion network security monitoring platform
14 min read
April 27, 202614 min read

Security Onion Fundamentals: Network Security Monitoring and Threat Hunting

by Mohamed Habib Jaouadi

A practical introduction to Security Onion, explaining how it combines network security monitoring, log management, and threat hunting into a coherent blue team platform.

#security-onion
#nsm
#siem
+6
Cyber Threat Intelligence foundations for blue team operations
22 min read
April 26, 202622 min read

CTI Foundations: Part 1 - What Cyber Threat Intelligence Is and Why It Matters

by Mohamed Habib Jaouadi

Part 1 of the CTI Foundations series. Learn what CTI actually is, how the intelligence lifecycle works, and why understanding IOCs, TTPs, and intelligence consumers changes defensive outcomes.

#cti-foundations
#threat-intelligence
#soc
+3
DNS Security Analysis Part 3 - Advanced Attack Techniques and Modern DNS Challenges
27 min read
February 8, 202627 min read

DNS Security Analysis Series: Part 3 - Advanced Attack Techniques and Modern DNS Challenges

by Mohamed Habib Jaouadi

Advanced DNS attack vectors including tunneling, IDN abuse, encrypted DNS protocols, and enterprise security implementation strategies for security analysts.

#dns-security-series
#dns-analysis
#malicious-domains
+3
Reversing Golang Internals
10 min read
January 29, 202610 min read

Reversing Golang: A Journey into the Internals

by Mohamed Habib Jaouadi

A deep dive into reverse engineering Go binaries. Learn about Go's internal data structures, compilation flags, PCLNTAB, ABI changes, and how to reconstruct slice and interface operations in IDA Pro.

#reverse-engineering
#golang
#ida-pro
+3
Formal automata diagrams overlaid on cybersecurity infrastructure
24 min read
December 28, 202524 min read

The Chomsky Hierarchy and Security: Why Parsers Matter

by Mohamed Habib Jaouadi

A deep dive into formal language theory, automata, and Turing machines and their profound implications for cybersecurity. Learn why regex WAFs fail, how injection attacks exploit parser differentials, and how to apply grammar-based parsing to stealer logs and malware analysis.

#LangSec
#Computer Science
#Blue Team
+5
Windows Development with C++ - Win32 API Fundamentals
17 min read
December 18, 202517 min read

Windows Development with C++: Part 1 - Foundations

by Mohamed Habib Jaouadi

Part 1 of the Windows Development series. Master Win32 API fundamentals, window creation, the message loop, and modern C++ patterns for native Windows programming.

#windows-development-series
#win32-api
#c++
+3
Technical visualization of Command and Control infrastructure
14 min read
December 14, 202514 min read

Command & Control in 2025: Architecture, Evasion & Operations

by Mohamed Habib Jaouadi

A technical deep dive into modern C2 architecture (Sliver, Havoc), evasion techniques (Shellter Elite, Stack Spoofing, AMSI Blinding), and alternative infrastructure (Discord C2, Cloud Redirectors).

#C2
#Malware Development
#Red Teaming
+3
Windows Protected Processes - Security Analysis and Inspection Tools
17 min read
November 22, 202517 min read

Windows Protected Processes Series: Part 1

by Mohamed Habib Jaouadi

Part 1 of the Windows Protected Processes series. Learn about protected processes, Process Explorer limitations, and why even administrators can't access critical system processes like CSRSS and LSASS.

#windows-protected-processes-series
#windows-internals
#process-inspection
+3
Windows Protected Processes Part 2 - Advanced Inspection and Security
33 min read
November 22, 202533 min read

Windows Protected Processes Series: Part 2

by Mohamed Habib Jaouadi

Advanced inspection techniques with Process Hacker, WinDbg kernel debugging, LSASS credential protection, BYOVD attacks, detection strategies, and system hardening for Windows protected processes.

#windows-protected-processes-series
#process-hacker
#windbg
+5
DNS Fundamentals and Security Analysis - DNS Security Series Part 1
20 min read
August 25, 202520 min read

DNS Security Analysis Series: Part 1 - DNS Fundamentals and Architecture

by Mohamed Habib Jaouadi

Deep dive into DNS architecture, record types, resolution process, and security analysis techniques for network defenders and DNS analysts.

#dns-security-series
#dns-analysis
#dns-forensics
+3