Blog
📖
BlogAll Posts
Technical
Non-Technical
❓
ShiftNon-Technical
🤫
Always Be Self-CriticizingTechnical
AI
🤖
Threat Hunting with Elastic MCPTechnical
DFIR
🕵🏼
Xintra: Assassin KittyDFIR
Technical
CTF
Technical
CTF
DFIR
🥷🏼
LummaStealerTechnical
Windows
Reverse Engineering
📂
IE DCOM to LFITechnical
Windows
💦
NTLMv2 leaking in Web ApplicationsTechnical
Windows
🥐
Book Review: Practical Vulnerability ManagementBook Summary
Book Review
🔥
Firefox SecurityTechnical
Reverse Engineering
🐝
PHP Censor v2.1.4 CVE-2024-34914CVE
🐝
WP Plugin Bug CVE-2024-4873CVE
🐝
HTMLy v2.9.6 CVE-2024-34191CVE
🐝
CVE-2024-2047CVE
🐝
CVE-2024-2948CVE
🌩️
Azure Access TokensTechnical
Cloud
🫀
Healthy and WealthyNon-Technical
📙
Books that changed my thinkingNon-Technical
👤
WhoamiNon-Technical
♟️
pwnable.tw - StartCTF
Technical
pwn
⚡
Agent TeslaMalware
Reverse Engineering
Technical
🦆
QakBot Hooking AnalysisTechnical
Malware
Reverse Engineering
🤖
Custom Sample AnalysisTechnical
Malware
Reverse Engineering
🚷
Anti-Analysis in MalwareTechnical
Reverse Engineering
Malware
💉
Process InjectionTechnical
Malware
Reverse Engineering
👜
Malware Delivery (Part 2)Technical
Malware
Reverse Engineering
👜
Malware Delivery (Part 1)Technical
Malware
Reverse Engineering
👃🏼
Ursnif AnalysisTechnical
Reverse Engineering
Malware
📏
Malware AlgorithmsTechnical
Reverse Engineering
Malware
✍🏼
Creating a Language: LexerTechnical
Languages
📶
Determining Protocols based on Network PacketsTechnical
Networking
💬
New PlaceNon-Technical
🐼
PandaBankerTechnical
Reverse Engineering
Malware
Stinky the Lonely Dolphin
Non-Technical
🤫
Always Be Self-CriticizingTechnical
AI
Aug 27, 2025
🤖
Threat Hunting with Elastic MCPTechnical
DFIR
May 23, 2025
🕵🏼
Xintra: Assassin KittyDFIR
Technical
CTF
Apr 18, 2025
Technical
CTF
DFIR
Apr 7, 2025
🥷🏼
LummaStealerTechnical
Windows
Reverse Engineering
Mar 19, 2025
📂
IE DCOM to LFITechnical
Windows
Dec 19, 2024
💦
NTLMv2 leaking in Web ApplicationsTechnical
Windows
Dec 12, 2024
🔥
Firefox SecurityTechnical
Reverse Engineering
Sep 2, 2024
🌩️
Azure Access TokensTechnical
Cloud
Mar 9, 2024
♟️
pwnable.tw - StartCTF
Technical
pwn
Oct 31, 2023
⚡
Agent TeslaMalware
Reverse Engineering
Technical
Oct 20, 2023
🦆
QakBot Hooking AnalysisTechnical
Malware
Reverse Engineering
Oct 10, 2023
🤖
Custom Sample AnalysisTechnical
Malware
Reverse Engineering
Oct 8, 2023
🚷
Anti-Analysis in MalwareTechnical
Reverse Engineering
Malware
Sep 25, 2023
💉
Process InjectionTechnical
Malware
Reverse Engineering
Sep 15, 2023
👜
Malware Delivery (Part 2)Technical
Malware
Reverse Engineering
Sep 12, 2023
👜
Malware Delivery (Part 1)Technical
Malware
Reverse Engineering
Sep 11, 2023
👃🏼
Ursnif AnalysisTechnical
Reverse Engineering
Malware
Aug 28, 2023
✍🏼
Creating a Language: LexerTechnical
Languages
Aug 28, 2023
📏
Malware AlgorithmsTechnical
Reverse Engineering
Malware
Aug 28, 2023
📶
Determining Protocols based on Network PacketsTechnical
Networking
Aug 14, 2023
🐼
PandaBankerTechnical
Reverse Engineering
Malware
Aug 10, 2023