Malware Analysis
Static & dynamic analysis of PE, scripts, and fileless threats.
Cyber Threat Intelligence
Malware Analyst / CTI Researcher
Tracking adversaries. Dissecting malware. Publishing open-source threat intelligence to help defenders stay ahead.
01 / About
Security researcher focused on understanding the adversary: how malware operates, how campaigns are structured, and how threat actors evolve their tradecraft over time.
Every report published here is the result of hands-on reverse engineering, sandbox analysis, and OSINT research. Technical findings are translated into actionable intelligence.
// No vendor hype. No marketing fluff. Just raw analysis.
Static & dynamic analysis of PE, scripts, and fileless threats.
Proactive hunting across telemetry using ATT&CK framework TTPs.
Structured threat reports, IOC extraction, and actor profiling.
Open-source intelligence gathering and infrastructure tracking.
02 / Reports
Each report documents a real-world malware sample or campaign from initial triage through full reverse engineering. IOCs, YARA rules and ATT&CK TTPs are included.
English edition of the report covering CVE-2026-21509 exploitation and Covenant Grunt delivery.
Read report >Analysis of the StreamerApp variant in which a CPL applet launches a browser-based implant using Chromium, WebSocket, and Chrome DevTools Protocol.
Read report >Upcoming reports will extend the archive with new reverse engineering notes and CTI observations.
Read report >