HTK Security Blog

Practical guides, threat analyses, and field notes from our instructors. Real content for practitioners.

AllThreat IntelligenceSecurity AwarenessDefense StrategyMalware AnalysisOSINT

Featured

Malware Analysis
Featured16 min read

Malware Analysis Walkthrough: Dissecting an AgentTesla Infostealer

A complete step-by-step analysis of AgentTesla using PE-Studio, FLOSS, x64dbg, ProcMon, and Wireshark. Includes MITRE ATT&CK mapping and a YARA detection rule.

Read article

Recent articles

Stay sharp

Want more content like this?

Join our community on Discord to get early access to new guides, lab walkthroughs, and instructor Q&As.