Conducted a static analysis of a sample malware executable without running it. Extracted strings and analyzed headers to determine its potential functionality and identify indicators of compromise (IOCs).
Conducted a static analysis of a sample malware executable without running it. Extracted strings and analyzed headers to determine its potential functionality and identify indicators of compromise (IOCs).
Performed a security review of an Amazon Web Services (AWS) S3 bucket configuration. Identified and corrected misconfigurations that could have led to public data exposure.
Developed a custom Python script to automate the discovery of subdomains for a given target. This tool is essential for mapping the attack surface during the initial phase of a penetration test.