Projects
Blog
Blog
Hidden Flaws in Unix Printing System
Blog
Attack Observation Report: Do The Botnet
Blog
Cyber Threat Intelligence: CVE Assessment
Blog
Attack Observation Report: Hello, SpaceX
Blog
Attack Observation Report: Analysis of Cryptominer Activity
Blog
Attack Observation Report: Comparison Project
Blog
Moving Forward: My GPYC Triumph and Digital Forensics
Blog
Secure Key Exchange Over An Unsecured Network
Blog
Demystifying the TCP 3-Way Handshake: More Than Just a Simple SYN-SYN/ACK-ACK
Blog
Unraveling YARA: Creating and Understanding Rules
Blog