top of page
Search

IR Policies When Considering CIA

Organizations of any significant size that provides some kind of service inevitably handles sensitive information. When considering a...

Hide It in Plain Sight

Part of a malware analysis I wrote on included a payload hidden in a Graphics Interchange Format (GIF) file. A reverse shell backdoor...

Hunting for File Signatures

In attempting to learn Python, I’ve been trying to find any reason to implement the language into any project I could think of. I thought...

bottom of page