• Skip to primary navigation
  • Skip to content
  • Skip to footer
Malware Analysis Navigating the Shadows of Cyber Threats
    • Malware Analysis
    • Threat Hunting
    • Machine Learning
    • Tools
    • All Categories
    Daniel Jeremiah

    Daniel Jeremiah

    Daniel is a Senior Security Operations Analyst with expertise in malware analysis, reverse engineering, DFIR, and adversarial machine learning (AML).

    • London Area, UK
    • Email
    • Twitter
    • LinkedIn
    • GitHub

    Posts by Category

    • Malware Analysis 6
    • Threat Hunting 2
    • Tools 2
    • Phishing 1

    Malware Analysis

    Analysing PCAP Files in a Modern Way: Investigating AsyncRAT Infection Traffic with SELKS

    27 minute read

    Introduction

    Unmasking Hidden Threats: Using Velociraptor for Process Hollowing Analysis

    22 minute read

    Introduction

    Deobfuscating Obfuscated VBS Remcos Malware: Unveiling the Techniques and Capabilities

    16 minute read

    History of Remcos Malware

    Analysing STRRAT Malware: Uncovering Obfuscated JavaScript

    20 minute read

    Overview

    Inside the Zoom_Invite.call Phishing Attack: Analysing Malware Distribution Methods Via Telegram C2 Bot

    24 minute read

    Introduction

    Understanding Fileless Malware

    3 minute read

    Understanding Fileless Malware

    Back to Top ↑

    Threat Hunting

    Analysing PCAP Files in a Modern Way: Investigating AsyncRAT Infection Traffic with SELKS

    27 minute read

    Introduction

    Unmasking Hidden Threats: Using Velociraptor for Process Hollowing Analysis

    22 minute read

    Introduction

    Back to Top ↑

    Tools

    Analysing PCAP Files in a Modern Way: Investigating AsyncRAT Infection Traffic with SELKS

    27 minute read

    Introduction

    Unmasking Hidden Threats: Using Velociraptor for Process Hollowing Analysis

    22 minute read

    Introduction

    Back to Top ↑

    Phishing

    Analysing a Fake Royal Mail Smishing Attack Hidden Behind Cloudflare

    5 minute read

    Analysing a Fake Royal Mail Smishing Attack Hidden Behind Cloudflare

    Back to Top ↑
    • Feed
    © 2025 daniyyell All rights reserved. Powered by Jekyll & Minimal Mistakes.