mylr.sh

Most organizations are preparing for the last attack. Sophisticated adversaries are already operating three moves ahead. As AI accelerates both the speed and scale of offensive capability, that gap is widening faster than most defenders recognize.

Threat Intelligence

  • OSINT Collection & Analysis
  • IOC Extraction & Enrichment
  • Campaign Tracking
  • MITRE ATT&CK Mapping

Defensive Operations

  • Incident Response
  • Detection Engineering
  • Threat Hunting
  • Log Analysis & SIEM

Development

  • Python Automation
  • Data Pipeline Design
  • Web Application Security
  • API Integration

Indicators expire. Infrastructure rotates. The operational logic underneath a campaign, how adversaries select targets, sustain access, and adapt under pressure, persists across all of it.

My research focuses on that layer: behavioral patterns that hold regardless of tooling changes, supply chain compromise methodologies, identity infrastructure abuse, and the tradecraft of sophisticated actors targeting enterprise and critical infrastructure environments. The analytical standards come from environments where the cost of a wrong assessment was not a missed detection.

My background is in intelligence operations, where adversary analysis was an operational requirement with consequences, not a reporting function. That foundation, the discipline around sourcing, the intolerance for speculation presented as assessment, the focus on behavior over artifacts, carries directly into the work on this site.

The tools and research I publish here are the output of applying that tradecraft to problems the commercial security industry consistently underestimates. I work with organizations that are serious about understanding what they are actually facing, not just what their current vendor stack can see. That work spans threat intelligence program design and maturation, adversary behavioral analysis for detection engineering and hunt operations, intelligence support to incident response where attribution and campaign context determine strategy, and assessment of security posture against specific named threat actors rather than generic risk categories.