Date Author Title
2022-09-26Xavier MertensEasy Python Sandbox Detection
2021-12-28Russ McReeLotL Classifier tests for shells, exfil, and miners
2021-04-02Xavier MertensC2 Activity: Sandboxes or Real Victims?
2020-11-20Xavier MertensMalicious Python Code and LittleSnitch Detection
2017-12-14Russ McReeDetection Lab: Visibility & Introspection for Defenders
2017-06-17Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2016-08-29Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2015-02-10Mark BaggettDetecting Mimikatz Use On Your Network
2014-09-27Guy BruneauWhat has Bash and Heartbleed Taught Us?
2013-12-16Tom WebbThe case of Minerd
2013-08-19Johannes UllrichRunning Snort on ESXi using the Distributed Switch
2012-09-02Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-08-16Johannes UllrichA Poor Man's DNS Anomaly Detection Script
2008-11-16Maarten Van HorenbeeckDetection of Trojan control channels