Reading Paths
Use these paths when you want a focused route through the blog instead of a complete topic list.
CTI Analyst
- CTI Analyst Field Manual - Complete Reference
- Applying Sherman Kent's Analytic Discipline to CTI
- ATT&CK as a Working Tool
- Attribution Methodology
- Manual CTI vs. AI-Assisted CTI
CTI-to-Detection Builder
- Customer-Driven AI CTI Project
- Part 1: Foundations
- Part 2A: Phase-by-Phase Execution Guide
- Part 2B: Reference Toolkit
- CTI-Led Defensive Strategy for a Cellular Provider
Malware Analyst
- Android APK Analysis Tool
- I Built an AI-Powered Malware Debugger
- Open the Malware Analysis & Forensics section in the Medium master index
AI Security Builder
- AI in Offensive Operations
- The AI Revolution in Cybersecurity
- HexStrike-AI: A Force Multiplier for Red Teams
- The Intelligent Shield. OpenCTI
Red Team / Pentest
- Open the AI-Driven Pentesting & Exploitation section.
- Open the Active Directory & Red Team section.
- Open the Metasploit & Exploitation section.
- Open the Password & Credential Cracking section.
Blue Team / SOC
- The Intelligent Shield. OpenCTI
- Manual CTI vs. AI-Assisted CTI
- Open the Threat Hunting & Detection section.
- Open the SOC, Awareness & Best Practices section.
- Open the Logging, DevOps & XPLG section.