Securinets 2025 — Silent Visitor
CTF WriteupInvestigation of a malicious npm package and its Go-based payload through Windows disk image analysis.
Memory Forensics with Volatility 3
WalkthroughA complete beginner-to-intermediate guide to memory forensics using Volatility 3. Covers installation, essential plugins, process analysis, network artifact extraction, and memory-resident malware hunting.