๐Ÿ“š All Educational Series

Comprehensive Cybersecurity Education Across Multiple Domains

Explore our growing collection of in-depth educational series covering various cybersecurity topics. Each series provides complete coverage from basics to advanced techniques, with hands-on labs and detection strategies.


๐Ÿ” Series 1: BYOPH - Bring Your Own Protocol Handler

Status: โœ… Complete Level: Intermediate Platform: Windows Parts: 7

A comprehensive guide to Windows protocol handler attacks, from basic concepts to advanced evasion techniques.

View Full Series โ†’

Quick Overview

Windows protocol handler attacks that achieve code execution, persistence, and evasion without exploits or admin privileges.

Topics Covered:

Resources:


BYOPH Series Articles

Part 1: The Hidden Attack Surface in Every Click

Topics: Protocol handlers, registry basics, attack chain overview

Read Article 1 โ†’

What Youโ€™ll Learn:


Part 2: Anatomy of an Attack

Topics: Artifact analysis, IoC extraction, forensic investigation

Read Article 2 โ†’

What Youโ€™ll Learn:


Part 3: Building a Safe Testing Ground

Topics: Lab setup, benign handler creation, safe testing practices

Read Article 3 โ†’


Part 4: HKCU vs HKLM - Understanding Persistence

Topics: Registration methods, precedence rules, privilege requirements

Read Article 4 โ†’


Part 5: From Documents to Browsers

Topics: Invocation methods, attack surface analysis, delivery mechanisms

Read Article 5 โ†’


Part 6: Hunting BYOPH - Detection and Response

Topics: Detection rules, Sysmon configuration, threat hunting

Read Article 6 โ†’


Part 7: OPSEC and the Future

Topics: Advanced techniques, evasion methods, evolved defenses

Read Article 7 โ†’

What Youโ€™ll Learn:


๐Ÿšง Coming Soon: Future Series

๐Ÿ“ง Series 2: Advanced Phishing Techniques

Status: ๐Ÿ”œ Planned | Level: Intermediate | Platform: Cross-Platform

Email security analysis, link obfuscation, credential harvesting detection, and anti-phishing strategies.


โšก Series 3: PowerShell Security

Status: ๐Ÿ”œ Planned | Level: Intermediate | Platform: Windows

Script analysis, deobfuscation, logging, offensive PowerShell techniques, and detection strategies.


๐Ÿฆ  Series 4: Malware Analysis Fundamentals

Status: ๐Ÿ”œ Planned | Level: Advanced | Platform: Cross-Platform

Static/dynamic analysis, reverse engineering basics, sandbox evasion, and behavioral analysis.


๐Ÿ” Series 5: Threat Hunting Methodologies

Status: ๐Ÿ”œ Planned | Level: Advanced | Platform: Cross-Platform

Hypothesis-driven hunting, data source analysis, tool development, and hunt documentation.


๐Ÿ’ก Want to see a specific topic? Suggest a series โ†’


โš ๏ธ Important Notice

All content is for educational and authorized security testing only. Always:


โ† Back to Home BYOPH Series โ†’ Code Samples โ†’ Detection Rules โ†’