<feed xmlns="http://www.w3.org/2005/Atom"> <id>/</id><title>BoBNewz's Blog</title><subtitle>Cybersecurity blog :)</subtitle> <updated>2026-02-06T11:22:07+00:00</updated> <author> <name>BoBNewz</name> <uri>/</uri> </author><link rel="self" type="application/atom+xml" href="/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 BoBNewz </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Solving the The Tunnel Without Walls HackTheBox Sherlock with MultiVol</title><link href="/posts/Solving-Forensics-challenges-with-Multivol/" rel="alternate" type="text/html" title="Solving the The Tunnel Without Walls HackTheBox Sherlock with MultiVol" /><published>2026-02-05T13:58:00+00:00</published> <updated>2026-02-05T13:58:00+00:00</updated> <id>/posts/Solving-Forensics-challenges-with-Multivol/</id> <content type="text/html" src="/posts/Solving-Forensics-challenges-with-Multivol/" /> <author> <name>bobnewz</name> </author> <category term="Forensics" /> <summary>MultiVol, make the Memory Forensics easier and faster.</summary> </entry> <entry><title>Decrypting Havoc C2</title><link href="/posts/Decrypting-C2-Havoc/" rel="alternate" type="text/html" title="Decrypting Havoc C2" /><published>2026-01-13T20:34:00+00:00</published> <updated>2026-02-02T16:07:19+00:00</updated> <id>/posts/Decrypting-C2-Havoc/</id> <content type="text/html" src="/posts/Decrypting-C2-Havoc/" /> <author> <name>bobnewz</name> </author> <category term="Forensics" /> <summary>Memory &amp; Network Forensics / Reverse Engineering of the C2 Havoc.</summary> </entry> </feed>
