██████╗ ██████╗ ███╗ ███╗ █████╗ ███████╗ ██████╗ ███╗ ███╗███████╗ ██╔════╝██╔═══██╗████╗ ████║██╔══██╗██╔════╝██╔═══██╗████╗ ████║██╔════╝ ██║ ██║ ██║██╔████╔██║███████║███████╗██║ ██║██╔████╔██║█████╗ ██║ ██║ ██║██║╚██╔╝██║██╔══██║╚════██║██║ ██║██║╚██╔╝██║██╔══╝ ╚██████╗╚██████╔╝██║ ╚═╝ ██║██║ ██║███████║╚██████╔╝██║ ╚═╝ ██║███████╗ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝ ╚═════╝ ╚═╝ ╚═╝╚══════╝
Digital Forensics & Incident Response
Malware Analysis • Threat Intelligence • Security Research
Arch Linux • M$ Windows • Python • PowerShell • Bash • Hyprland •QEMU/KVM
Available Tools & Resources
Mini-RETK
Mini Reverse Engineering Toolkit in a webapp for static file analysis. Contains various commandline utilities for static analysis workflows mainly focused on PDFs and generates reports with the output.
go0seREtk
Reverse Engineering Toolkit for Malware Analysis. This tookit will walk you through and install basic tools needed for a safe Malware Analysis Lab.
References & Notes
Collection of useful shit to me. How-to's created by AI, DFIR methodologies, malware analysis notes, and threat intelligence references stored in markdown format.