Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Month: August 2013

Neo4j Pathfinder with road type prefference

August 31, 2013 rioasmara

Hi All, Today I would like to post on how the graph database (Neo4j) can be used for path finding. As you know that in

Continue reading

Neo4j Traverser into table

August 27, 2013 rioasmara

Hi All, Today, I would like to post a bit of my creation on the data Neo4j traversal. As you know that Neo4j traversal is

Continue reading

Neo4j Implement PathExpander Sequence

August 22, 2013 rioasmara

Hi All, After took some rest for a while, I would like to post some kind of simple implementation of pathexpander since it is really

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk
  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...