bencrypted
Musings about the triad of intelligence, hunting, and detection engineering
Start
Personal Portfolio of blog posts diving into threat intelligence, hunting, and detection engineering, along with the occassional post highlighting privacy and hardening considerations.
Recent Posts
- Detection Engineering Lense: Crafting Detections on Threat Actor movement . /posts/10/
- Unpacking BlackBasta Chat Leaks . /posts/9/
- Detection Engineering Lense: Crafting Detections on IAB Behavior . /posts/8/
- Have you lost Signal? . /posts/7/
- Hardened CTI Environment . /posts/6/
Walkthroughs
-
Posts
- Detection Engineering Lense: Crafting Detections on Threat Actor movement
- Unpacking BlackBasta Chat Leaks
- Detection Engineering Lense: Crafting Detections on IAB Behavior
- Have you lost Signal?
- Hardened CTI Environment
- Auditing GNU/Linux with OSQuery
- Plague Kernel
- PlagueOS: Operating System of the Underground
- GrapheneOS: Beyond Compliance
- whoami