Archive Blogs

MITRE ATT&CK : The Overview

A quick introduction to YARA Rules

A brief introduction to PE Format

A brief introduction to ELF Format

A brief introduction to Sysmon

A brief introduction on Linker, Loader, Symbol & Symbol Tables

A brief introduction on Threads in Linux

Exploring Ghidra with Baby ELF

AVR Microcontroller Fundamental speed run

Exploring Sigma Rules

Weaponize the Dark Web for OSINT

Operations Security

A Look into Geospatial Intelligence

A glimpse of unrestricted file upload

Social Network Analysis

The Unconventional Guide to conducting OSINT on LinkedIn

Using OSINT to investigate Cryptocurrency Transactions

Volatility & Wannacry

Reversing Ryuk

Intoduction to Malware Analysis

IsDebugger Internals

Packing and Obfuscation

Introduction to Game Hacking!

Applications of reverse engineering in Security 1

ODbgScript Cheat Sheet

OSINT: The What, The Why and The How

OS Command Injection: Beginner’s Guide

Sockpuppets: The Make or Break of an Investigation