Blog Posts

Technical writings about security, cloud, and more

How I Discovered Google's Secret Weapon Against Phishing While Setting Up a Pentesting Lab
Unmasking Mayhem: A Forensic Dive into a Havoc C2 Intrusion