hi there — i’m oj.
i love security, and this site is where i learn in public. breaking down incidents, building forensics workflows, dabbling in some malware analysis, and sharing the repeatable patterns that actually work.
new here? the shortlist →
Songtrust Impersonation via SMS, Fake Work Portal, Telegram Pivot
Unsolicited SMS promised easy remote pay, linked to a Songtrust-branded login page that simply funnels victims to Telegram.
PCAP Analysis Using tshark For Some Malware
Dabbling with light malware analysis. Starting with investigating the PCAP file
Email Threat Analysis: Rapid .eml Triage Commands for Analysts
Shell commands to run when triaging a downloaded .eml file, with explanations of what each command and flag does.
PRVIEW
Browser-based phishing email analysis: import .eml or raw source, parse headers/body, extract URLs, and export a clean summary.
dispatch
personal security notes. what i’m learning, breaking down, and making sense of.
→playbooks
repeatable scripts and workflows, with the reasoning behind when to run them.
→labs
hands-on experiments, ctf writeups, and research from digging deeper.
→say hi: me@heyosj.com • linkedin • x • github