Skip to content

Blogs

Long form technical writing on malware analysis, reverse engineering, detection engineering, and GenAI security. Each post reflects independent personal research, independent lab work, and public source analysis.

5 published posts 3 in pipeline RSS feed Jump to upcoming
Detection

From EKFiddle to YARA: Building a Detection Rule Pipeline

The workflow behind converting regex-based web traffic rules into YARA signatures for sandbox deployment.

Coming soon
GenAI

Shadow AI on Enterprise Networks: Detection and Hunting

Writing CrowdStrike LogScale and Splunk queries to detect unauthorized LLM usage, AI coding assistants, and GenAI misuse.

Coming soon
Threat Research

Supply Chain Attacks: Hash Auditing Across Package Repositories

Building Python tools to perform SHA256 verification across PyPI, npm, GitHub, and HuggingFace during compromise response.

Coming soon