Uncovering the Marijuana PHP Backdoor and How They Evading Detection
At the start of 2025, I found myself navigating a challenging situation while assi...
Detection Engineering & Threat Hunting
At the start of 2025, I found myself navigating a challenging situation while assi...
In this blog, we delve into the practical application of Cyber Triage tools in ana...
Welcome to my guide on creating a local sandbox an isolated lab environment for ma...
RedLine is a stealer distributed as cracked games, applications, and services. The...
Decoding malware loaders using Procmon and AI (ChatGPT). Utilising Powershell to r...