go0se@comasome:~$ whoami
 ██████╗ ██████╗ ███╗   ███╗ █████╗ ███████╗ ██████╗ ███╗   ███╗███████╗
██╔════╝██╔═══██╗████╗ ████║██╔══██╗██╔════╝██╔═══██╗████╗ ████║██╔════╝
██║     ██║   ██║██╔████╔██║███████║███████╗██║   ██║██╔████╔██║█████╗  
██║     ██║   ██║██║╚██╔╝██║██╔══██║╚════██║██║   ██║██║╚██╔╝██║██╔══╝  
╚██████╗╚██████╔╝██║ ╚═╝ ██║██║  ██║███████║╚██████╔╝██║ ╚═╝ ██║███████╗
 ╚═════╝ ╚═════╝ ╚═╝     ╚═╝╚═╝  ╚═╝╚══════╝ ╚═════╝ ╚═╝     ╚═╝╚══════╝
        

Digital Forensics & Incident Response

Malware Analysis • Threat Intelligence • Security Research

Arch Linux • M$ Windows • Python • PowerShell • Bash • Hyprland •QEMU/KVM

Available Tools & Resources

🔍

Mini-RETK

Mini Reverse Engineering Toolkit in a webapp for static file analysis. Contains various commandline utilities for static analysis workflows mainly focused on PDFs and generates reports with the output.

🔬

go0seREtk

Reverse Engineering Toolkit for Malware Analysis. This tookit will walk you through and install basic tools needed for a safe Malware Analysis Lab.

📚

References & Notes

Collection of useful shit to me. How-to's created by AI, DFIR methodologies, malware analysis notes, and threat intelligence references stored in markdown format.

Local Resources Browse Files →
OS: Arch Linux / M$ Windows
Terminal: Kitty + PowerShell
Editors: NeoVim + Sublime Text
Virtualization: QEMU/KVM + Virt-Manager
Location: The Matrix, with all of you.
go0se@comasome:~$ _