About this site

As a former CTI Analyst turned Threat Hunter, I started this blog to share independent research as a way to document my findings. Topics cover malware analysis, infrastructure hunting, and technique-specific attacks.
All photos are my own.