Decoding Cobalt Strike Payloads
Learn a technique to understand the types of obfuscation and better reveal the associated payload.
ReadResources for cybersecurity
A blog published by Justin Watson aimed at collecting resources and insights on Digital Forensics, Incident Response, Threat Hunting, and Malware Analysis.
Learn a technique to understand the types of obfuscation and better reveal the associated payload.
ReadExplore the intricacies of decoding and analyzing Emotet's sophisticated PowerShell scripts to uncover their malicious operations.
ReadAn expansive blog written by Jai Minton/CyberRaiju. Contains topics like blue team/red team cheatsheets, CTF writeups, and guides for reverse engineering and malware analysis.
A website collecting and hosting several cybersecurity whitepapers, malware write-ups, research papers, and incident response reports.
An online platform for searching and visualizing indicators of compromise and their associations.
I am Justin Watson, I have worked in the information security or cybersecurity sector for the last six years. I have experience and applied my practical insights in most of the topics on this website, this is also a place where I may post my collective resources, and experiences or lessons learned as a result of conducting research. My occupation involves actively analyzing, responding to, and mitigating cyber threats frequently.