Developer & Security Researcher documenting the journey. Cybersecurity, AI, and everything I find along the way.

$ tail -n 3 logs.txt
0x01

The Inevitable Traces of Malware

Discover how malware always leaves digital footprints, from suspicious files to network traffic patterns. Learn to identify host-based and network-based indicators of compromise (IOC) to detect infections in your system.

#malware#malware analysis#IoC#cybersecurity
0x02

EtherNet/IP and the CIP Protocol

How communication with Allen-Bradley PLCs works: from device identification to manual construction of CIP messages

#ICS#EtherNet/IP#CIP#Allen-Bradley
0x03

Introduction to My TILs

My story, why I'm returning to pentesting, and what to expect from this journal

#meta#introduction#pentesting
View all logs →