Welcome to My Security Blog
CTF write-ups, lab notes, tool breakdowns, and anything else worth storing.
What This Blog Is
I’m Omar. Computer science student (Cybersecurity) at APU, dual award with De Montfort. My work is written down here — CTF write-ups, lab notes, tool breakdowns, anything I think is worth storing.
Not a fresh start. More of an eventuality after needing one place where everything exists. Old, new, continuing stuff.
What to Expect
- CTF Write-ups — post-competition breakdowns. Bingo CTF 2025 my team dehashed placed 26th. Forensics, Pwn, Web, RE. Win or lose I write it up.
- Lab Notes — HackTheBox, TryHackMe, self-hosted stuff. Kali, Burp, Nmap, Wireshark.
- Reverse Engineering — memory analysis, Cheat Engine, low-level tinkering.
- Network Security — informed by my CCNA and real packet analysis.
- Memory Forensics — volatile memory acquisition, malware artifacts, IOCs.
Where I’m At
There were two things that recently made me think differently about this.
During the Axiata Cyber Fusion Center tour, the Group Head of Cybersecurity said: find something that you love, stay with it. His colleague added: begin all projects with a problem statement — not something to build, something to solve. Both things I needed to hear at this stage, not to be read off a slide.
All these write-ups are my attempts to do that. Not only recording what I did, but also why it worked or didn’t.
Going Forward
Posts will go up whenever I complete something. No set timetable — the backlog is real though, so there is content forthcoming.
If you found this from a write-up, a box, GitHub, or LinkedIn — welcome.
