Blogs
Secure Malware Analysis …
As a system administrator dealing with security incidents, you’ll inevitably encounter situations where you need to analyze suspicious files. Running malware on your production systems? Absolutely not. That’s where Docker comes in—providing isolated, disposable environments for safe …
Modern AV Evasion …
Understanding how antivirus evasion works is essential for both offensive and defensive security professionals. This knowledge helps red teamers simulate advanced threats and helps blue teamers understand what they’re defending against. ⚠️ Disclaimer: This content is for educational purposes …
Hardening Linux Servers: …
When setting up a new Linux server—whether it’s a web server, database, or application host—security hardening is non-negotiable. This guide covers the essential steps I follow when preparing any production Linux server. Initial Setup Create a Non-Root Admin User Never use root for daily …


