Blog

Thoughts, insights, and experiences from my journey in cybersecurity and threat intelligence.

A Methodological Framework for Malicious Infrastructure Hunting Using Open-Source Intelligence
Threat Intelligence
A Methodological Framework for Malicious Infrastructure Hunting Using Open-Source Intelligence
Learn the fundamentals of adversary infrastructure hunting with this methodological framework. Discover how to shift from reactive to proactive threat hunting using open-source intelligence and free tools.
How to Tame Your AI Coding Agent
Artificial Intelligence
How to Tame Your AI Coding Agent
How GitHub's Spec Kit Fixed My AI Coding Workflow
My OSEP Exam Review
Exam Reviews
My OSEP Exam Review
My detailed experience taking the OSEP exam, including study strategies, exam challenges, and lessons learned from the OffSec Experienced Penetration Tester certification.
My OSTH Exam Review
Exam Reviews
My OSTH Exam Review
A detailed review of the OffSec OSTH (OffSec Threat Hunter) exam and TH-200 course. Learn about threat hunting with CrowdStrike Falcon, Splunk, and Suricata in this comprehensive certification experience.
My HTB CPTS Exam Review
Exam Reviews
My HTB CPTS Exam Review
An honest review of the HTB CPTS exam experience, including course materials, exam challenges, reporting requirements, and comparison with OSCP. Learn from my mistakes and get practical advice.
Let's Hunt for C2 Servers using Censys
Threat Intelligence
Let's Hunt for C2 Servers using Censys
Hunting for Command and Control servers using Censys search engine
Threat Intelligence
Introducing the GRU's Youngest Sibling - Ember Bear
An in-depth analysis of Unit 29155's new cyber operations unit Ember Bear, their activities, and how they differ from other GRU cyber groups like Fancy Bear and Sandworm.
Understanding Russia's Intelligence Agencies Part 3: The GRU Explained
Threat Intelligence
Understanding Russia's Intelligence Agencies Part 3: The GRU Explained
The GRU's Role in Supporting Russian Military Intelligence Requirements
Understanding Russia's Intelligence Agencies Part 2: The SVR Explained
Threat Intelligence
Understanding Russia's Intelligence Agencies Part 2: The SVR Explained
The SVR's Role in Espionage, Cyber-Operations and Shaping Russian Foreign Policy
Threat Intelligence
Understanding Russia's Intelligence Agencies Part 1: The FSB Explained
The FSB's Role in Balancing Domestic Authority and Global Influence
Exploring Russia's Disinformation Campaigns
Threat Intelligence
Exploring Russia's Disinformation Campaigns
Understanding Russian disinformation tactics and their impact on global politics
Hunting Adversary Infrastructure using Censys
Threat Intelligence
Hunting Adversary Infrastructure using Censys
Learn how to use Censys for threat hunting and adversary infrastructure discovery. Discover C2 servers, open directories, and malicious infrastructure using advanced search techniques.