In-depth security research, case studies, and technical documentation
Step-by-step guide to acquiring volatile memory from AWS EC2 instances using Margarita Shotgun for incident response and forensic analysis.
Beginner-to-intermediate guide on compiling and installing a custom Linux kernel.
Detailed forensic analysis of the PacketMaze challenge from CyberDefenders.
Forensic analysis of the BlackEnergy malware challenge using Volatility.
Guide to deploying a private self-hosted cloud storage solution using Nextcloud.
Beginner-friendly walkthrough for deploying and accessing a Linux VM in the cloud.
Showing 6 of 6 writeups
Subscribe to receive notifications when new technical writeups, case studies, and security research are published.