Hi there! š
Welcome to my blog ā a place for IT-Security that prefers context over headlines.
This space is dedicated to the careful analysis of adversary behavior, malicious infrastructure, and the often inconvenient details that turn raw observations into usable intelligence.
- šŗ LinkedIn: https://www.linkedin.com/in/manuel-boll-78097b217/
- ā¤ļø GitHub: https://github.com/kaeptenbalu
- š§ Email: hello@mboll.eu
- š“ CTFTime: https://ctftime.org/user/82511
- š§ Hack The Box: https://app.hackthebox.com/profile/61653
- šļø Credly (Certifications): https://www.credly.com/users/manuel-boll/badges
- š§© CTF Team (FreakazoidS): https://freakazoids.de/
Latest Post
Your Malware Is Talking. Iām Listening
Ping Me Maybe - When SubCrawl Started Talking to Teams
Volt Typhoon ā Constructed Intelligence or Defeated Adversary?
Volt Typhoon ā Constructed Intelligence or Defeated Adversary?
Brilliant and Simple - Filename-Based Sandbox Evasion
A Promptly Bad Idea - Malware Meets AI