$ whoami

K0lj
CTI Analyst & Engineer

Cyber Threat Intelligence analyst and engineer — I track threat actors, hunt for IOCs, and analyze malware campaigns. Passionate about automation and development: if something is repetitive, I build a tool for it. CTF player, tinkerer, and chronic over-engineer.

./blog./projects

// recent_posts

all posts →
[misc]Make N8N Webhooks Safe Again

N8n Webhooks ereichen mit ngrok ohne das komplette ui zu exposen

2026-03-17
#N8n#Webhooks#Automations

// projects

./vigil-cti
privateWIP

CTI Case Management System tracks campaigns and IOCs. Structures intelligence workflows from collection to finished report.

PythonCTIAutomation

// about

I work at the intersection of threat intelligence and software engineering. My day-to-day is tracking adversaries, mapping TTPs to MITRE ATT&CK, and turning raw intel into actionable insights.

What sets me apart is the dev side — I automate the boring parts. IOC enrichment, report parsing, threat feed ingestion: if I do it more than twice, I script it.

Outside of work I play CTFs, contribute to open-source tooling, and write about what I learn here.

THREAT INTELLIGENCE

Threat IntelligenceMalware AnalysisOSINTMITRE ATT&CKSIEM / SplunkThreat Hunting

DEVELOPMENT & AUTOMATION

PythonTypeScriptAutomationREST APIs

OTHER

CTFReverse EngineeringNetwork AnalysisLinux

// contact

Want to collaborate, share intel, or just talk hacking? Reach out.

GitHubTwitter / X