skip to content
0x_welsh

Reverse Engineer & Malware Analyst

Windows internals · unpacking · dynamic analysis

I break binaries to understand how malware evades detection. Each analysis documents the methodology: which hypotheses failed, why specific tools proved effective, and how evasion techniques actually work.

The focus is on unpacking protected executables, defeating anti-analysis measures, and making reverse engineering decisions transparent. Analysis over speculation.

Member of k0mrads CTF team

Analytical Focus

Featured Technical Analysis

TryHackMe: Web Attack Forensics - Drone Alone

A comprehensive blue team investigation walkthrough of the TryHackMe Web Attack Forensics room, analyzing malicious web activity and command injection attacks using Splunk.

tryhackme forensics blue-team splunk

Static Analysis

Pure disassembly and no-execution analysis using Ghidra, IDA, and decompilation techniques

Mastering Obfuscation Principles - TryHackMe Writeup

A comprehensive guide to understanding obfuscation techniques for malware evasion, from basic concatenation to advanced control flow manipulation. Learn how attackers hide their code and how defenders can spot these techniques.

Vulnerability & Exploitation Research

CVE analysis and exploit technique research

Forensics & Incident Analysis

Log analysis, network forensics, and attack reconstruction case studies

Reverse Engineering Notes

View all notes →

Short observations, pattern notes, and methodology tips from analysis work.

What is the Heap

Understanding heap memory allocation and its characteristics

Recent Activity

A comprehensive guide to x86 CPU architecture fundamentals essential for malware reverse engineering. Learn about registers, memory layout, and stack operations that form the foundation of system exploitation.

tryhackme x86-architecture malware-analysis

A comprehensive guide to understanding obfuscation techniques for malware evasion, from basic concatenation to advanced control flow manipulation. Learn how attackers hide their code and how defenders can spot these techniques.

tryhackme obfuscation malware-analysis

A comprehensive walkthrough of TryHackMe's Cyber Kill Chain room, exploring each phase of cyber attacks from reconnaissance to actions on objectives, plus a real-world analysis of the Target data breach.

tryhackme cyber-kill-chain cybersecurity

Web exploitation challenge targeting a malicious e-commerce platform with cookie manipulation and privilege escalation vulnerabilities.

ctf advent-of-ctf web-exploitation