Mohamed Azeez

Mohamed Azeez

EDR

8 stories

CC: http://struppigel.blogspot.com/2017/07/process-injection-info-graphic.html
Mohamed Azeez

Mohamed Azeez

DFIR

359 stories

Mohamed Azeez

Mohamed Azeez

Productivity

1 story

Mohamed Azeez

Mohamed Azeez

Detection Engineering

49 stories

Mohamed Azeez

Mohamed Azeez

Malware Analysis

109 stories

Mohamed Azeez

Mohamed Azeez

Threat Intelligence

146 stories

Mohamed Azeez

Mohamed Azeez

Azure

21 stories

Mohamed Azeez

Mohamed Azeez

Packet analysis

9 stories

Mohamed Azeez

Mohamed Azeez

Pentest

39 stories

Mohamed Azeez

Mohamed Azeez

Leadership and Managment

11 stories

Mohamed Azeez

Mohamed Azeez

Investigation

118 stories

Mohamed Azeez

Mohamed Azeez

Python

3 stories

Mohamed Azeez

Mohamed Azeez

Cloud security

7 stories

Mohamed Azeez

Mohamed Azeez

SOAR

20 stories

Mohamed Azeez

Mohamed Azeez

AWS

4 stories

Mohamed Azeez

Mohamed Azeez

Security Architecture

1 story

Mohamed Azeez

Mohamed Azeez

CTF

23 stories

Mohamed Azeez

Mohamed Azeez

Basics Reverse Enggineering

17 stories

Mohamed Azeez

Mohamed Azeez

DNS

3 stories

Mohamed Azeez

Mohamed Azeez

Threat hunting

143 stories