Skip to content

Search

Recent Posts

  • YARA, the Threat Pattern Hunter
  • Simple Reverse Engineering
  • Introducing my Home Lab
  • Asymmetric Encryption
  • My OSCP+ Exam

Categories

  • Adversary
  • Info-Sec

Contact

Email
mail@jamsng.com

  • Home
  • Whoami
Jam-ng a Cybersecurity Grinder
Jam-ng a Cybersecurity Grinder
  • Home
  • Info-Sec
  • Adversary
  • Whoami
Info-Sec

YARA, the Threat Pattern Hunter

YARA rule cheatsheet from information security researcher fr0gger_ What is YARA YARA, which stands for “Yet Another Recursive...
JamApr 25, 2025Apr 25, 2025
AdversaryInfo-Sec

Simple Reverse Engineering

What is Reverse Engineering? Reverse engineering is the process of analyzing a product, system, or software to understand...
JamApr 21, 2025Apr 22, 2025
Info-Sec

Introducing my Home Lab

Home Network & Segregation – Why It Matters More Than You Think There’s no way you’d go the...
JamApr 18, 2025Apr 18, 2025
Info-Sec

Asymmetric Encryption

While symmetric encryption uses only one key, and you would need to share the key with others, asymmetric...
JamApr 15, 2025Apr 16, 2025
Adversary

My OSCP+ Exam

My version of the r/oscp subreddit story “I passed OSCP+ on my first attempt” When I pick up...
JamApr 14, 2025Apr 16, 2025
Info-Sec

Identity and Access Management (IAM)

The 4 Pillars of IAM: Your First Line of Defense in Cybersecurity If you’re new to cybersecurity, there’s...
JamApr 14, 2025Apr 14, 2025
Info-Sec

CIA Triad

CIA Triad: Where Cybersecurity Begins When it comes to cybersecurity, everything begins with the CIA Triad — a...
JamApr 14, 2025Apr 14, 2025