$

2026-03-06

NIST CSF v2 ↔ ISO 27002:2022 — Mapping Notes

Notes from a mapping project between NIST Cybersecurity Framework v2 and ISO 27002:2022 controls, done during a GRC internship at Enedis. Includes the methodology, key alignment points, and a maturity simulation tool built on top of the mapping.

grc nist iso27001 compliance governance

2025-03-26

ICS/OT Threat Modeling — Three Critical Infrastructure Attacks

Structured threat analysis of three ICS/OT attacks using MITRE ATT&CK for ICS: Stuxnet (2010), Ukraine power grid (2015), and Danish energy sector (2023). Attack chain reconstruction, TTPs mapping, and framework comparison.

ics ot scada mitre-attack threat-modeling stuxnet critical-infrastructure

2025-01-08

OWASP Juice Shop — Web Application Penetration Testing

Hands-on penetration testing of OWASP Juice Shop across 4 difficulty levels: SQL injection, DOM XSS, CSRF, session manipulation, null-byte bypass, and FTP enumeration. Tools: ZAP 2.15.0, Foxy Proxy.

web-security owasp pentesting sql-injection xss csrf zap

2025-01-07

Zyxel Firmware Analysis — Extraction, ZIP Cracking, and Credential Recovery

Full firmware analysis of a Zyxel network device: binwalk extraction of a squashfs filesystem, known-plaintext attack on the ZIP encryption with pkcrack, and hashcat-based credential recovery from shadow.basic.

firmware reverse-engineering binwalk hashcat cryptography embedded

2024-10-21

Memory Forensics with Volatility — WinXP SP2 Dump Analysis

Full walkthrough of a Windows XP SP2 memory dump using Volatility 2.6.1 — 14 plugins covering process enumeration, hidden process detection, network connections, registry artifacts, kernel modules, and live memory inspection via volshell.

forensics volatility memory-forensics windows dfir blue-team

2023-09-01

Cerber Ransomware — Static & Dynamic Analysis Lab

Full analysis of a 2017 Cerber sample under Flare-VM and Cuckoo Sandbox — packed and unpacked, behavioral tracing from DLL loading to file encryption, real IoCs.

malware-analysis ransomware reverse-engineering flare-vm cuckoo

2023-06-12

Android Fuzzing with Droid-FF and Radamsa

Automated fuzzing of Android .dex files using Droid-FF and Radamsa on a Genymotion emulator. Full triage pipeline: crash detection via logcat, tombstone collection, addr2line symbolization, and crash path analysis through libz.so adler32.

fuzzing android droid-ff radamsa adb security