>_MattySploit
[About] [Blog] [Cyber News] [Contact]

> all_blog_posts

Catching North Koreans & Laptop Farms

Catching North Koreans & Laptop Farms

Detection Techniques for Farms on Your Network

June 13, 2025

Threat Intelligence Threat Hunting Threat Analysis
Deep Diving Amadey Source Code

Deep Diving Amadey Source Code

When C2 works both ways

March 25, 2025

Amadey Stealers Threat Analysis
A History of GraphAPI Attacks

A History of GraphAPI Attacks

Everybody's in the Cloud, particularly the attacker

February 07, 2025

O365 Tactic Tracking Threat Intelligence
C2 Redirector Usage and You

C2 Redirector Usage and You

A Blue Teamer's Guide to Obfuscated Command & Control

January 12, 2025

Command & Control Threat Hunting Infrastructure Tracking Threat Intelligence

> connect_with_me

>_ Let's chat! Hit me up for discussions, collaborations, challenges, or just to connect.

© 2025 ☠ >_Matt_Ryan. All rights reserved.

Last updated: