Malware Reversing • Threat Hunting • Detection

Malware Analyst

I research suspicious applications, malware loaders, infostealers, proxyware, obfuscation techniques, and campaign infrastructure, then share findings to help analysts hunt, detect, and understand emerging threats.

Recent Malware Analysis

Latest posts pulled from the research blog, using custom post summaries and Blogger labels where available.