• Skip to primary navigation
  • Skip to content
  • Skip to footer
Malware Analysis Uncovering Malware Analysis, One Byte at a Time
  • Malware Analysis
  • Threat Hunting
  • Machine Learning
  • Tools
  • Datasets
  • Research
  • All Categories
    Daniel Jeremiah

    Daniel Jeremiah

    Daniel is a cybersecurity professional with over eight years of experience in Security Operations, Detection Engineering, Incident Response, and VAPT. He holds an MSc in Cybersecurity and certifications including CISM, CASP+, eCTHP, CRTO, and others. Skilled in malware analysis, threat hunting, SOAR, and adversarial simulations, Daniel has submitted over 40 vulnerabilities via Bugcrowd and HackerOne bug bounty programs, including six to Google.

    • London Area, UK
    • Email
    • Twitter
    • LinkedIn
    • GitHub

    Recent Posts

    Investigating Suspicious Memory Activity: Tracing a SIEM Alert to a Cobalt Strike C2

    29 minute read

    1.0 Introduction

    Memory Forensics Attack Simulation Dataset

    1 minute read

    Introduction

    Threat Hunting on Windows Server 2016: Uncovering Hidden C2 Malware Using Elastic SIEM

    27 minute read

    1.0 Introduction

    Using Velociraptor to Detect and Hunt for Affected Systems: Unknown Malware Analysis

    30 minute read

    1.0 Introduction

    Inside the Zoom_Invite.call Phishing Attack: Analysing Malware Distribution Methods Via Telegram C2 Bot

    24 minute read

    Introduction

    • Previous
    • 1
    • 2
    • 3
    • Next
    • Feed
    © 2025 © Daniel Jeremiah. All rights reserved.. Powered by Jekyll & Minimal Mistakes.