Pau Muñoz
- About Me
- I've always studied and worked at the intersection of sociology and engineering. Academically, I hold a PhD in Strategic Studies (USAL, 2024) and another in Artificial Intelligence (UAM, 2025).
- My research focuses on the cross-disciplinary study of Information Warfare, with a special interest in Cyber Intelligence, the strategic implications of cyberspace, and cybersecurity. On that matter, I have professional experience leading teams in organizations linked to the European Defense sector.
- These days, I work as a Security Researcher at UNIR, an activity that I happily combine with the management of my entrepreneurial ventures.
- Beyond technical matters, I am passionate about studying economics, philosophy, and competing (or just completing) in long-distance triathlons, particularly in the Ironman series races.
- github
- keep in touch: newsletter, rss feed
- Some Recent Publications
- The Birth of the Influencer-Activist: A Case Study from Spain
- Modeling Disinformation Networks on Twitter: Structure, Behavior, and Impact
- Quantifying Polarization in Online Political Discourse
- La Doctrina de las Grandes Potencias en la Guerra de la Información
- Los Frentes Invisibles: El Conflicto Geopolítico a través de la Guerra de la Información (book)
- El Derecho a la Información en las Redes Sociales (chapter)
- posts
- 2025-01-01 Everything is Information
- 2022-08-23 Malware analysis with IDA/Radare2 - PE Injection techniques, the fundamentals
- 2022-08-01 Malware analysis with IDA/Radare2 - DLL Injection techniques, the fundamentals
- 2022-07-15 Malware analysis with IDA/Radare2 2 - From unpacking to config extraction to full reversing (IceID Loader)
- 2022-07-12 Malware analysis with IDA/Radare2 - Multiple unpacking (Ramnit worm)
- 2022-07-09 Malware analysis with IDA/Radare2 - Basic Unpacking (Dridex first stage)
- 2022-07-03 Malware analysis with IDA/Radare2 - Analyzing maldocs (Emotet Dropper)
- 2022-06-29 Reverse engineering x64 binaries with Radare2 - Dealing with ASLR
- 2022-06-27 Malware analysis with IDA/Radare2 - C# Malware (Ziraat)
- 2022-06-25 Reverse engineering x64 binaries with Radare2 - Defeating stack canaries
- 2022-06-19 Reverse engineering x64 binaries with Radare2 - Enabling code execution on Stack
- 2022-06-14 Reverse engineering x64 binaries with Radare2 - Bypasssing DEP with simple ROP Chains
- 2022-06-12 Reverse engineering x64 binaries with Radare2 - Exploiting basic Buffer Overflows
- 2020-12-01 Generating contextual geographic intelligence with shodan
- 2020-06-14 Reverse engineering x64 binaries with Radare2 - 19 (unix encrypted bind shells over TLS)
- 2020-06-13 Reverse engineering x64 binaries with Radare2 - 18 (Bind and reverse shells)
- 2020-06-10 Reverse engineering x64 binaries with Radare2 - 17 (winsock, udp C&C and file exfiltration through DNS)
- 2020-06-04 Reverse engineering x64 binaries with Radare2 - 16 - II (more sockets, http emulation, radasm, ragg and shellcode)
- 2020-06-03 Operational security techniques in asymmetric conflicts - II (device acquisitions)
- 2020-06-01 Reverse engineering x64 binaries with Radare2 - 16 (unix sockets fundamentals)
- 2020-06-01 Anonymous and the rise of 'hacktivism' as a collective action phenomenon
- 2020-05-29 Operational security techniques in asymmetric conflicts - I (threat modeling)
- 2020-05-25 Reverse engineering x64 binaries with Radare2 - 15 (Windows fundamentals; Intro to WinApi and file management)
- 2020-05-15 Reverse engineering x64 binaries with Radare2 - 14 - I (linux systems programming; theory, syscalls, files and ESIL)
- 2020-05-13 Reverse engineering 32 and 64 bits binaries with Radare2 - 13 (defines, unions and bitmaps)
- 2020-05-11 Reverse engineering 32 and 64 bits binaries with Radare2 - 12 (linked lists, enums, bitwise operations and r2pipe)
- 2020-05-07 Reverse engineering 32 and 64 bits binaries with Radare2 - 11 (more pointers and dynamic structs)
- 2020-05-06 Reverse engineering 32 and 64 bits binaries with Radare2 - 10 (pointers and dynamic memory)
- 2020-05-05 Reverse engineering 32 and 64 bits binaries with Radare2 - 9 (files; read, write, seek and some heaps :O)
- 2020-05-04 Reverse engineering 32 and 64 bits binaries with Radare2 - 8 (start doing crackmes now!)
- 2020-05-04 Reverse engineering 32 and 64 bits binaries with Radare2 - 7 (struct arrays, r2pm and patching)
- 2020-05-02 Reverse engineering 32 and 64 bits binaries with Radare2 - 6 (2d arrays and structs)
- 2020-05-01 Reverse engineering 32 and 64 bits binaries with Radare2 - 5 (var types and casting)
- 2020-04-30 Reverse engineering 32 and 64 bits binaries with Radare2 - 4 - II (more strings)
- 2020-04-29 Reverse engineering 32 and 64 bits binaries with Radare2 - 4 (arrays and strings)
- 2020-04-26 Reverse engineering 32 and 64 bits binaries with Radare2 - 3 (funcs, cases and loops)
- 2020-01-25 Embedded systems programming with atmel328 - 6
- 2020-01-20 Reverse engineering x64 binaries with Radare2 - Exploiting basic Buffer Overflows
- 2020-01-19 Async programming made easy with python asyncio
- 2020-01-14 Writting linux32 shellcode from scratch - 1
- 2020-01-14 Embedded systems programming with atmel328 - 5
- 2020-01-13 Reverse engineering 32 and 64 bits binaries with Radare2 - 1
- 2020-01-11 Embedded systems programming with atmel328 - 4 (temperature&humidity)
- 2020-01-11 Embedded systems programming with atmel328 - 3 (microservos)
- 2020-01-11 Madrid real estate renting market data analysis
- 2020-01-11 Embedded systems programming with atmel328 - 1
- 2020-01-05 Embedded systems programming with atmel328 - 2 (ultrasounds)
- 2019-01-19 Selectors in Ember Page Object
need to track user feedback? learn more about astuto