╔══════════════════════════════╗
║ DEFENDER PROFILE ║
╚══════════════════════════════╝
"Attackers practice their tech. Defenders must practice harder."
"Every attack technique is a fighting game matchup. Study the move, find the telemetry, build the counter."
"If you haven't exercised today, exercise before studying. It's not competing with study time — it's enabling it."
"Logs are the roots. Telemetry is the soil. Detection is the harvest."
| Category | Tools & Skills |
|---|---|
| SIEM | Splunk, Elastic Stack |
| Detection | Sigma rules, Sysmon, Windows Event Logs |
| Malware Analysis | REMnux, FlareVM, x64dbg, Binary Ninja (learning) |
| Programming | C (learning), PowerShell, Python basics |
| Frameworks | MITRE ATT&CK, Cyber Kill Chain |
| Networking | Wireshark, tcpdump, Cisco IOS |
SOC Analyst. Building toward detection engineering and malware development. Currently in Phase 1R: finishing TCM PMAT, starting C programming foundations, preparing for CDSA.
3.5-4 year malware development program at ~45 hrs/month. Assembly, shellcode, Win32 API, process injection, C2 frameworks. Building a career, not speedrunning a course.
Adversary Arcade is a training ground for defenders. It treats cybersecurity like a fighting game — every attacker has a move list, every move leaves telemetry, and every defender needs to lab the matchup.
The site serves as a public research notebook, a progress tracker, a malware encyclopedia, and a detection engineering portfolio. It's built with static HTML/CSS/JS in the spirit of the old internet.
Study the opponent. Lab the tech. Build better defenses.
ADVERSARY ARCADE — fungiknight
© 2026 | Built with static HTML in the spirit of the old internet