STATUS: EXPLOITED BY THE NSA

Incident Response &
Malware Analysis

Basically my Computer Science notes, mostly focused on me trying to master cybersecurity.

> Operator Profile

I'm a student trying to speedrun my way into becoming a Cybersecurity Analyst because I’m lowkey obsessed with the "how" and "why" behind every cyber train wreck. My personality is basically dissecting malware, hunting for artifacts in disk images, and monitoring SIEM alerts so I have a reason why I can't sleep.


This site is just a brain dump for my investigative workflows and technical breakdowns. Zero fluff, no corporate yapping, no spyware, just the actual findings.

> Addictions

SOC Operations

Splunk SPL, ELK Stack, Triage, Threat Hunting, SIEM Automation.

Digital Forensics

Disk Imaging, Memory Forensics (Volatility), Registry Analysis, Timeline Construction.

Malware Analysis

x64dbg, Ghidra, IDA Pro, Static & Dynamic Analysis, Unpacking.

Scripting

Bash, PowerShell, Python, C/C++ (Basic).

> Operations Log

Loading intelligence data...

> Establish Comms

Only unserious business


cat2