Blog
Thoughts, insights, and experiences from my journey in cybersecurity and threat intelligence.

Threat Intelligence
Learn the fundamentals of adversary infrastructure hunting with this methodological framework. Discover how to shift from reactive to proactive threat hunting using open-source intelligence and free tools.

Artificial Intelligence
How GitHub's Spec Kit Fixed My AI Coding Workflow

Exam Reviews
My detailed experience taking the OSEP exam, including study strategies, exam challenges, and lessons learned from the OffSec Experienced Penetration Tester certification.

Exam Reviews
A detailed review of the OffSec OSTH (OffSec Threat Hunter) exam and TH-200 course. Learn about threat hunting with CrowdStrike Falcon, Splunk, and Suricata in this comprehensive certification experience.

Exam Reviews
An honest review of the HTB CPTS exam experience, including course materials, exam challenges, reporting requirements, and comparison with OSCP. Learn from my mistakes and get practical advice.

Threat Intelligence
Hunting for Command and Control servers using Censys search engine
Threat Intelligence
An in-depth analysis of Unit 29155's new cyber operations unit Ember Bear, their activities, and how they differ from other GRU cyber groups like Fancy Bear and Sandworm.

Threat Intelligence
The GRU's Role in Supporting Russian Military Intelligence Requirements

Threat Intelligence
The SVR's Role in Espionage, Cyber-Operations and Shaping Russian Foreign Policy
Threat Intelligence
The FSB's Role in Balancing Domestic Authority and Global Influence

Threat Intelligence
Understanding Russian disinformation tactics and their impact on global politics

Threat Intelligence
Learn how to use Censys for threat hunting and adversary infrastructure discovery. Discover C2 servers, open directories, and malicious infrastructure using advanced search techniques.