STATUS: EXPLOITED BY THE NSA

All Things About
Cybersecurity

Basically my Computer Science notes, mostly focused on me trying to master cybersecurity.

> Operator Profile

I'm a student trying to become Cybersecurity Professional because I’m lowkey obsessed with the "how" and "why" behind every cyber train wreck. My personality is basically dissecting malware, hunting for artifacts in disk images, and monitoring SIEM alerts so I have a reason why I can't sleep.


This site is just a brain dump for my investigative workflows and technical breakdowns. Zero fluff, no corporate yapping, no spyware, just the actual findings.

> Addictions

SOC Operations

Splunk SPL, ELK Stack, Triage, Threat Hunting, SIEM Automation.

Digital Forensics

Disk Imaging, Memory Forensics (Volatility), Registry Analysis, Timeline Construction.

Malware Analysis

x64dbg, Ghidra, IDA Pro, Static & Dynamic Analysis, Unpacking.

Scripting

Bash, PowerShell, Python, C/C++ (Basic).

> SEC

Loading intelligence data...

> Deploy Funds

If you want to support me or you have too much money, you can send me some :). Purely optional btw.

  • Bitcoin (BTC) bc1q523x8prfg2jc73c7xs9r0ttzqxjjw0jlgkth7p
  • Ethereum (ETH) 0x813445e34A4B64CD665894DF4238c30E7551e58d
  • Avalanche (C-Chain) 0x813445e34A4B64CD665894DF4238c30E7551e58d
  • Arbitrum One 0x813445e34A4B64CD665894DF4238c30E7551e58d
  • Polygon (MATIC) 0x813445e34A4B64CD665894DF4238c30E7551e58d

> Establish Comms

Only unserious business!


cat2