# secbysrg > Security research, CTF write-ups, threat analysis, and tooling. - [About](/about/): About secbysrg - [Page not found](/404/): The page you're looking for doesn’t exist or has moved. Check the URL, use the navigation to browse sections, or return to the homepage. - [Privacy Policy](/privacy/): Learn how we collect, use, and protect your personal data, what rights you have over your information, and how to contact us with questions. - [Blog](/blog/): Read product updates, release highlights, and practical tips that explain what’s new, why it matters, and how to get the most value from this project. - [Docs](/docs/): Write-ups, research, and tooling. ## Blog > Read product updates, release highlights, and practical tips that explain what’s new, why it matters, and how to get the most value from this project. - [Example Post](/blog/example-post/): Learn how to write clear, structured product update posts that explain what changed, why it matters, and how users can successfully adopt new features. ## Docs > Write-ups, research, and tooling. - [Write-ups](/docs/writeups/): CTF, HackTheBox, TryHackMe, and competition write-ups. - [Research](/docs/research/): Malware analysis, threat intelligence, and detection engineering. - [Tools](/docs/tools/): Custom tools, scripts, detection rules, and automation. ### Write-ups > CTF, HackTheBox, TryHackMe, and competition write-ups. ### Research > Malware analysis, threat intelligence, and detection engineering. - [AgentTesla Infostealer — Static & Dynamic Analysis](/docs/research/agenttesla-infostealer-static-dynamic-analysis/): Analysis of an AgentTesla sample delivered via phishing. Covers unpacking, C2 extraction, and detection opportunities. ### Tools > Custom tools, scripts, detection rules, and automation.