Hi there! š
Welcome to my blog ā a place for IT-Security that prefers context over headlines.
This space is dedicated to the careful analysis of adversary behavior, malicious infrastructure, and the often inconvenient details that turn raw observations into usable intelligence.
- šŗ LinkedIn: https://www.linkedin.com/in/manuel-boll-78097b217/
- ā¤ļø GitHub: https://github.com/kaeptenbalu
- š§ Email: hello@mboll.eu
- š” RSS Feed: https://www.mboll.eu/feed.xml
- š“ CTFTime: https://ctftime.org/user/82511
- š§ Hack The Box: https://app.hackthebox.com/profile/61653
- šļø Credly (Certifications): https://www.credly.com/users/manuel-boll/badges
- š§© CTF Team (FreakazoidS): https://freakazoids.de/
Latest Post
What Music Does Malware Listen To? A Deep Dive into Spotify's Dark Side š¦ šµ
Your Malware Is Talking. Iām Listening
Ping Me Maybe - When SubCrawl Started Talking to Teams
Volt Typhoon ā Constructed Intelligence or Defeated Adversary?
Brilliant and Simple - Filename-Based Sandbox Evasion
A Promptly Bad Idea - Malware Meets AI