All Things About
Cybersecurity
Basically my Computer Science notes, mostly focused on me trying to master cybersecurity.
> Operator Profile
I'm a student trying to become Cybersecurity Professional because I’m lowkey obsessed with the "how" and "why" behind every cyber train wreck. My personality is basically dissecting malware, hunting for artifacts in disk images, and monitoring SIEM alerts so I have a reason why I can't sleep.
This site is just a brain dump for my investigative workflows and technical breakdowns. Zero fluff, no corporate yapping, no spyware, just the actual findings.
> Addictions
SOC Operations
Splunk SPL, ELK Stack, Triage, Threat Hunting, SIEM Automation.
Digital Forensics
Disk Imaging, Memory Forensics (Volatility), Registry Analysis, Timeline Construction.
Malware Analysis
x64dbg, Ghidra, IDA Pro, Static & Dynamic Analysis, Unpacking.
Scripting
Bash, PowerShell, Python, C/C++ (Basic).
> SEC
Loading intelligence data...
> Deploy Funds
If you want to support me or you have too much money, you can send me some :). Purely optional btw.
- Bitcoin (BTC) bc1q523x8prfg2jc73c7xs9r0ttzqxjjw0jlgkth7p
- Ethereum (ETH) 0x813445e34A4B64CD665894DF4238c30E7551e58d
- Avalanche (C-Chain) 0x813445e34A4B64CD665894DF4238c30E7551e58d
- Arbitrum One 0x813445e34A4B64CD665894DF4238c30E7551e58d
- Polygon (MATIC) 0x813445e34A4B64CD665894DF4238c30E7551e58d