SMALL TEAM TIPS |
2009-03-22 | Mari Nichols | Dealing with Security Challenges |
SMALL |
2021-04-15/a> | Johannes Ullrich | Why and How You Should be Using an Internal Certificate Authority |
2009-03-22/a> | Mari Nichols | Dealing with Security Challenges |
TEAM |
2024-12-18/a> | Jesse La Grew | [Guest Diary] A Deep Dive into TeamTNT and Spinning YARN |
2024-11-07/a> | Xavier Mertens | Steam Account Checker Poisoned with Infostealer |
2023-07-01/a> | Russ McRee | Sandfly Security |
2023-05-09/a> | Russ McRee | Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2 |
2022-09-23/a> | Xavier Mertens | Kids Like Cookies, Malware Too! |
2022-09-19/a> | Russ McRee | Chainsaw: Hunt, search, and extract event log records |
2022-06-10/a> | Russ McRee | EPSScall: An Exploit Prediction Scoring System App |
2021-12-28/a> | Russ McRee | LotL Classifier tests for shells, exfil, and miners |
2021-03-06/a> | Xavier Mertens | Spotting the Red Team on VirusTotal! |
2021-03-02/a> | Russ McRee | Adversary Simulation with Sim |
2021-01-19/a> | Russ McRee | Gordon for fast cyber reputation checks |
2020-10-23/a> | Russ McRee | Sooty: SOC Analyst's All-in-One Tool |
2020-08-12/a> | Russ McRee | To the Brim at the Gates of Mordor Pt. 1 |
2020-06-30/a> | Russ McRee | ISC Snapshot: SpectX IP Hitcount Query |
2020-04-21/a> | Russ McRee | SpectX: Log Parser for DFIR |
2020-02-27/a> | Xavier Mertens | Offensive Tools Are For Blue Teams Too |
2020-01-21/a> | Russ McRee | DeepBlueCLI: Powershell Threat Hunting |
2019-11-29/a> | Russ McRee | ISC Snapshot: Search with SauronEye |
2019-11-08/a> | Xavier Mertens | Microsoft Apps Diverted from Their Main Use |
2019-10-06/a> | Russ McRee | visNetwork for Network Data |
2019-08-21/a> | Russ McRee | KAPE: Kroll Artifact Parser and Extractor |
2019-07-16/a> | Russ McRee | Commando VM: The Complete Mandiant Offensive VM |
2019-04-05/a> | Russ McRee | Beagle: Graph transforms for DFIR data & logs |
2019-02-05/a> | Rob VandenBrink | Mitigations against Mimikatz Style Attacks |
2018-10-17/a> | Russ McRee | RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence |
2018-06-16/a> | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2012-04-23/a> | Russ McRee | Emergency Operations Centers & Security Incident Management: A Correlation |
2011-03-25/a> | Kevin Liston | APT Tabletop Exercise |
2010-01-22/a> | Mari Nichols | Pass-down for a Successful Incident Response |
2010-01-14/a> | Bojan Zdrnja | DRG (Dragon Research Group) Distro available for general release |
2009-03-22/a> | Mari Nichols | Dealing with Security Challenges |
TIPS |
2011-12-21/a> | Chris Mohan | The off switch |
2009-03-22/a> | Mari Nichols | Dealing with Security Challenges |