- Published on
This welcome post kicks off my journey into offensive security research, with a focus on malware development, CTFs, and red teaming. I cover key principles every offsec researcher should remember, from documenting failures to thinking like both a developer and an attacker. I’ve also listed essential tools and techniques to get started, including shellcode loaders, API evasion, C2 frameworks, and analysis environments. Whether you're just diving into offsec or leveling up your tradecraft, this blog is here to document the hacks, the fails, and the fun.