Threat Intelligence Research Engineer · XPLG · Tel Aviv, Israel

Adversary profiling, detection engineering, and hands-on security lab work.

I profile adversary behavior, map TTPs to detection candidates, and build tooling to automate the mechanical parts of CTI and reverse engineering. Focus areas: attribution discipline, infrastructure pivoting, hunting hypothesis construction, detection backlog management, and AI-assisted analyst tooling with mandatory human review at every decision point.

About Andrey

Threat Intelligence Research Engineer at XPLG (enterprise security data platform). Formerly Head of Red Team — Israel Police Cyber Defence Unit. CTI-to-detection practitioner. Profiles adversary infrastructure, maps TTPs to ATT&CK-aligned detection candidates, and ships analyst tooling for CTI and reverse engineering workflows. Based in Tel Aviv, Israel.

Contact

Choose Your Review Path

Start with the path that matches what you are evaluating. Each path keeps the top story defensive and CTI-to-detection oriented.

One-page summary

Full Library

Use the full Medium navigator only after the selected paths. The homepage keeps selected work visible first so the portfolio stays scannable.

Flagship Projects

Seven top-tier projects that define the portfolio, followed by five strong supporting pieces.

Top-tier flagships

Strong supporting work

CVSS v4.0

CVSS v4.0 enrichment CLI (BTE scoring) that turns CVEs into prioritized vulnerability-management work using NVD, CISA KEV, EPSS, and configurable asset profiles. Companion Docusaurus field guide site with scoring explanations and practitioner decision frameworks.

Python CLICVSS v4.0vulnerability mgmt

StratusAI

Multi-cloud security scanner: 9 AWS modules + 7 GCP modules, 125-test suite, ECS Fargate / Cloud Run deployment. Multi-LLM finding analysis with attack-chain synthesis and severity classification in 2–4 minutes per scan.

cloud scannerAWS + GCPmulti-LLM

Android Malware Analysis

Android APK analysis toolkit: AI-powered static analysis from the terminal, OWASP Mobile Top 10 coverage, decompilation, manifest inspection, permission risk scoring, and output formatted for mobile security assessment reports.

malware analysisAndroidPython

Vulnerable AI Lab

Intentionally vulnerable AI security training lab — DVWA/WebGoat for modern AI systems. Pre-built OWASP LLM Top 10 2025 scenarios: prompt injection, RAG poisoning, tool-call manipulation, and data exfiltration via LLM agents in a realistic RAG pipeline.

LLM securityAI red teamOWASP LLM

Medium Blog Navigator

Docusaurus navigation layer for 200+ Medium articles — organized by topic, difficulty, and content cluster. Makes cross-article research and topic discovery practical at scale without relying on Medium's own recommendation engine.

Docusauruscontent navigation

Work by Domain

Start here before opening the full article library.

Malware Analysis

Malware analysis tools, APK analysis, YARA-related work, file triage, import analysis, strings, and unpacking utilities.

Cloud / Kubernetes Security

Cloud-native threat research, cloud scanning, vulnerable cloud labs, audit-log thinking, and prioritization support.

Live Evidence

Real screenshots from published research — tool outputs, malware analysis, infrastructure pivots, and attack simulations. Click any image to open the source article.

Kibana — det_mw_0001 spearphishing attachment detection PASS
Desert Hydra — det_mw_0001 (T1566.001) PASS Kibana captures Office child process spawn; spearphishing attachment detection validated
Kibana — det_mw_0010 LSASS credential access detection PASS
Desert Hydra — det_mw_0010 (T1003.001) PASS Sysmon EID 10 ProcessAccess to lsass.exe captured; credential access detection validated
OpenCTI — MuddyWater knowledge graph
Desert Hydra — OpenCTI knowledge graph MuddyWater intrusion set: 9 malware, 4 tools, 21 ATT&CK techniques, 20 source reports
AIDebug TUI — function analysis
AIDebug — function analysis (TUI) Capstone disassembly + FLIRT signature matching on real sample (MD5: c6ab7265…)
AIDebug — behavioral pattern tab
AIDebug — behavioral patterns tab PatternDetector flags T1055.001 and T1547.001 without AI call
AIDebug — malware pattern detection results
AIDebug — pattern detection output 8 behavioral patterns scanned per function; registry modification flagged
AIDebug — control flow graph visualization
AIDebug — control flow graph (CFG) Basic-block graph built per function; branch structure visible without reading ASM
AIDebug — four-panel TUI overview
AIDebug — four-panel TUI layout Disasm · Patterns · CFG · AI tabs on a live binary; no sandbox required
CFF Explorer — PE header analysis
CFF Explorer — PE header analysis Import table, DOS/NT headers, sections examined on Authenticator.exe
Detect It Easy — packing and obfuscation scan
Detect It Easy — entropy + packing scan DIE analysis: normal entropy, no packer detected on DearStealer sample
Process Monitor — Authenticator.exe process tree
Procmon — dynamic process trace Authenticator.exe runs with no subprocesses and closes after 2 min (stealer behavior)
FakeNet-NG — network traffic capture
FakeNet-NG — network capture No HTTP plaintext to malicious domain; encrypted TLS channel confirmed (T1573.001)
unpac.me — file upload for automated unpacking
unpac.me — automated unpacker upload Packed .NET sample submitted; SmartAssembly obfuscation layer identified
unpac.me — unpacked files ready for analysis
unpac.me — unpacked result Nested packing layers stripped; unpacked files available for static analysis
de4dot — .NET deobfuscation
de4dot — .NET deobfuscation DeepSea Obfuscator layer removed; strings and control flow restored
Android APK tool — terminal run output
APK Analyzer — terminal run Four-phase analysis from a single CLI command; no sandbox required
Android APK tool — Phase 1 static analysis
APK Analyzer — Phase 1 (Androguard) Permissions, intents, native libs, DEX entropy extracted via Androguard
Android APK tool — ATT&CK TTP mapping output
APK Analyzer — MITRE ATT&CK mapping CRITICAL service + T1416 OverlayActivity flagged without bytecode decompilation
Android APK tool — YARA scan results
APK Analyzer — YARA scan + AI analysis Curated ruleset hits for Cerberus/Joker/FluBot families; AI remediation steps output
stratus-ai — cloud attack simulation output
stratus-ai — cloud scan output AWS + GCP attack simulation: 9+7 modules, 125-test suite, CloudTrail capture
stratus-ai — findings report with severity
stratus-ai — findings report Multi-LLM severity classification and remediation output per finding
Handala infrastructure pivot chain
Handala — infrastructure pivot ASN reuse → passive DNS → crt.sh → 14 additional hosts · 22 confirmed hashes

Selected Article Library

Direct Medium links only. The blog navigator is listed separately as an index resource, not used as a substitute article link.

Medium profile

CTI, Attribution, Pivoting

The Intelligent Shield. OpenCTI

OpenCTI deployment, connector engineering, STIX workflows, enrichment source confidence management, and platform operations.

CTIOpenCTISTIX 2.1guide

CTI Research: Handala Hack Group

Threat persona and cluster analysis with evidence labels, IOC handling, and defensive guidance.

CTIHandalaIsraeldetection

Attribution Methodology

How to build, defend, and challenge attribution claims without overstating the evidence.

CTIattributionconfidenceguide

ATT&CK as a Working Tool

Hands-on ATT&CK use for mapping, gap analysis, Sigma thinking, hunting, and adversary emulation.

CTIATT&CKhuntinglong guide

Manual CTI vs. AI-Assisted CTI

Step-by-step comparison of where AI compresses CTI work and where analyst judgment remains non-negotiable.

CTIanalyst workflowtradecraftguide

CTI Program Design

Customer-Driven AI CTI Project

End-to-end CTI-to-detection methodology and project workflow overview.

CTI programdetection engineeringgovernance

Detection And Hunting

The Atomic Standard

Practitioner compendium for single-event threat detection and rule design.

detectionrulesarticle

The Invisible Pipeline

Defending CI/CD systems from targeted attacks with concrete controls and detection ideas.

detectionCI/CDDevSecOps

Malware, Cloud, AI Security

Android APK Analysis Tool

AI-assisted static APK malware analysis with YARA, VirusTotal context, candidate MITRE mapping, and Frida hooks.

malwaretoolAndroid

AI-Powered Malware Debugger

AIDebug walkthrough: FLIRT, patterns, CFGs, Frida, unpacking detection, YARA, and reports.

malwareATT&CKtool

StratusAI Cloud Security Scanner

AWS and GCP scanner architecture, multi-LLM routing, Terraform deployment, and test coverage.

cloudAWSGCPAI

AI in Offensive Operations

Evidence-based research on attacker AI use, TTPs, incidents, confidence, and forecast judgments.

CTIoffensiveAI security

CVSS v4.0 Field Guide

CVSS-BTE, KEV, EPSS, environmental scoring, examples, scanner triage, and automation.

vulnerabilityCVSSEPSS

Tools And Repositories

Repositories are grouped by defender output, not by programming language.

All GitHub repos

CTI Engineering

Reports, pivoting automations, detection packs, and hunting hypotheses that move intelligence into operational use.

CTIhuntingtooling

Guides & Docs

Docusaurus knowledge bases, field manuals, and structured references. 52+ step-by-step guides on Medium.

All guides → HexStrike →

CTI Analyst Field Manual

Analytic judgment, evidence discipline, hunting hypotheses, and ATT&CK-mapped detection candidates.

CTIhuntingmanual

Operation Desert Hydra

End-to-end CTI-to-detection pipeline: source review gate → procedure dataset → OpenCTI knowledge graph → 11 detection records → benign lab simulation → Kibana proof screenshots. 14 PASS / 1 PARTIAL / 1 FAIL across 16 rule checks.

CTI pipelinedetection engineeringOpenCTIlab-validated

Israel Government Threat Actors CTI

Defensive CTI knowledge base for Israeli public sector, critical infrastructure, municipal, and supplier exposure.

Israel CTIpublic sectordefense

Customer-Driven AI CTI Project

End-to-end methodology for turning intelligence requirements into hunts, detections, and delivery artifacts.

CTI programdetectionsgovernance

Customer-Driven AI CTI Template

Reusable templates for requirements, hunts, detections, evidence packs, and customer delivery.

templatehuntstoolkit

CVSS v4.0 Field Guide

Practical CVSS v4.0 scoring, environmental profiles, scanner triage, and prioritization guidance.

vulnerabilityCVSSrisk

HexStrike AI Guide

Authorized AI-assisted security lab workflows used as operator-context evidence for CTI work.

offensivelabAI

Medium Blog Navigator

Separate index for browsing the full Medium library by topic, depth, and role. Article cards above use direct article links.

indexnavigation150+ articles

OpenCTI Intelligent Shield

OpenCTI operations and security-team workflows for enrichment source confidence management and threat-intelligence platform work.

OpenCTItooloperations

Lab Work

Authorized, controlled environments built to understand attacker behavior, validate detection assumptions, and practice the full attack-to-defend cycle.

All labs →

Operation DragonRx

APT41 pharmaceutical-sector attack simulation. Log4Shell initial access → Sliver C2 → Active Directory lateral movement. Dual-layer detection with Wazuh + Zeek + Elastic.

CTIlabAPT41Log4Shell

Cloud & Kubernetes Labs

Vulnerable cloud infra for cloud pentest practice: GCP + AWS Terraform deployments, 25-issue Kubernetes misconfiguration lab, and IIS / SharePoint / Fluent Bit environment.

cloudlabTerraformKubernetesGCP

Active Directory Labs

Reproducible Windows / AD pentest environments: vulnerable Windows 10, full AD domain with GPOs, Kerberoasting, Pass-the-Hash, and LSASS dump paths. Manual and one-prompt Cursor AI deployments.

labWindowsActive DirectoryKerberos

Android Security Labs

Android analysis lab on Ubuntu (Androguard + Frida toolchain). Deliberately vulnerable Android app covering all OWASP Mobile Top 10 classes. Autonomous mobile PT walkthrough.

labAndroidOWASP MobileFrida

Vulnerable AI Lab

Intentionally vulnerable AI application lab — like DVWA but for modern AI: RAG assistants, tool-calling agents, LLM-powered copilots. Covers prompt injection, data exfiltration, and agent manipulation.

AI securitylabLLMRAG

Linux & Web App Labs

Vulnerable Ubuntu 24.04 server with full HexStrike pentest walkthrough. DVWA deployment automated with Ansible for reproducible web-app attack-and-detect practice.

labLinuxDVWAAnsible

About

I profile adversary behavior, map TTPs to ATT&CK-aligned detection candidates, and ship tools that automate the mechanical parts of CTI and reverse engineering work. Current role: Threat Intelligence Research Engineer at XPLG. Formerly Head of Red Team at Israel Police Cyber Defence Unit. All tooling ships with mandatory analyst review built into the workflow — AI assists with throughput, not with judgment.