Recent
Connecting OpenCTI to a Large Language Model pt. 2/2: OpenCTI as a Knowledge Base for a Question Answering System
Creating a Question Answering system with a LLM and Retrieval Augmented Generation (RAG).
Connecting OpenCTI to a Large Language Model pt. 1/2: Leveraging the Ask AI feature
Setting up OpenCTI and the Ask AI service, with a cloud or locally served LLM.
CTF Challenge: Obfuscated RAT
Writing a string decrypter for an obfuscated RAT during a CTF challenge.
Functional Analysis of FrostyGoop ICS Malware pt. 2/2
Taking FrostyGoop to the next level and attacking a simulated sorting machine.
Functional Analysis of FrostyGoop ICS Malware pt. 1/2
A short functional analysis of the FrostyGoop ICS malware.
Accurate Animation-Based C++ Melee Tracing in Unreal Engine 5
How to implement accurate melee tracing in Unreal Engine 5, as a prototype that brings together multiple concepts of game development.
An Analysis Of the GandCrab V2 Ransomware
In a university assignment, I was tasked with reversing GandCrab malware.
Fuzzing FreeImage to uncover vulnerabilities
Fuzzing FreeImage with American Fuzzy Lop in the hope to uncover vulnerabilities.
KeepassXC + SyncThing = ❤️
Learn how to use SyncThing to synchronize KeepassXC databases across devices and regain ownership of your data.
PMAT Challenge 1: SillyPutty
First challenge of the TCM Academy Practical Malware Analysis and Triage course.
PMAT Challenge 2: SikoMode
Second challenge of the TCM Academy Practical Malware Analysis and Triage course.
PMAT Challenge 3: Wannacry Bossfight
Bossfight challenge of the TCM Academy Practical Malware Analysis and Triage course.