Hartoyo Wahyu

Hartoyo Wahyu

Detection Engineering & Threat Hunting


Uncovering the Marijuana PHP Backdoor and How They Evading Detection

Uncovering the Marijuana PHP Backdoor and How They Evading Detection

At the start of 2025, I found myself navigating a challenging situation while assi...

Streamlining Digital Forensics Investigations with Cyber Triage

Streamlining Digital Forensics Investigations with Cyber Triage

In this blog, we delve into the practical application of Cyber Triage tools in ana...

Creating an Isolated Lab Environment for Malware Analysis & Reverse Engineering

Creating an Isolated Lab Environment for Malware Analysis & Reverse Engineering

Welcome to my guide on creating a local sandbox an isolated lab environment for ma...

Deep Dive Into Redline Stealer

Deep Dive Into Redline Stealer

RedLine is a stealer distributed as cracked games, applications, and services. The...

Unveiling Smokeloader with Procmon

Unveiling Smokeloader with Procmon

Decoding malware loaders using Procmon and AI (ChatGPT). Utilising Powershell to r...