Security oriented blog
04 Oct 2020
This post is a summary of impressions from book reads, documentaries and other sources of information I get exposed to in relation to the study of subjucts such as intellligence, foreign-policy, terrorism, cyber-security and more.
24 Nov 2019
After implementing a Maltego transform for exploring IPs and domains which is or has been used in the namesystem for Emercoin and Namecoin I will here show a few graphs where it has been used.
05 Oct 2019
After reading The Battle For Syria: International Rivalry In The New Middle East written by Christopher Phillips I will here provide a few comments on the book.
09 Feb 2019
The book Ghost Wars written by Steve Coll explains the civil war of Afghanistan starting from the overthrow of the Soviet supported regime all the way to the day before 9/11.
28 Dec 2018
This is a writeup on the packing technique used by current versions (at the time of publication) of the banking malware Retefe.
24 Nov 2018
After finishing two quite different books on the history of the Israeli intelligence agency Mossad I will provide my impressions of the books and outline their differences and strengths.
01 Jul 2018
Inspired by all the Threat Hunting going around lately I’ve tried to apply it towards Pastebin posts, with the question: “What cyclical activity can I find and what does it revolve around?”.
27 Jan 2018
Assignment #2 in the SLAE exam is to create a exec reverse shell shellcode.