2024-12-18 | Jesse La Grew | [Guest Diary] A Deep Dive into TeamTNT and Spinning YARN |
2024-11-07 | Xavier Mertens | Steam Account Checker Poisoned with Infostealer |
2023-07-01 | Russ McRee | Sandfly Security |
2023-05-09 | Russ McRee | Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2 |
2022-09-23 | Xavier Mertens | Kids Like Cookies, Malware Too! |
2022-09-19 | Russ McRee | Chainsaw: Hunt, search, and extract event log records |
2022-06-10 | Russ McRee | EPSScall: An Exploit Prediction Scoring System App |
2021-12-28 | Russ McRee | LotL Classifier tests for shells, exfil, and miners |
2021-03-06 | Xavier Mertens | Spotting the Red Team on VirusTotal! |
2021-03-02 | Russ McRee | Adversary Simulation with Sim |
2021-01-19 | Russ McRee | Gordon for fast cyber reputation checks |
2020-10-23 | Russ McRee | Sooty: SOC Analyst's All-in-One Tool |
2020-08-12 | Russ McRee | To the Brim at the Gates of Mordor Pt. 1 |
2020-06-30 | Russ McRee | ISC Snapshot: SpectX IP Hitcount Query |
2020-04-21 | Russ McRee | SpectX: Log Parser for DFIR |
2020-02-27 | Xavier Mertens | Offensive Tools Are For Blue Teams Too |
2020-01-21 | Russ McRee | DeepBlueCLI: Powershell Threat Hunting |
2019-11-29 | Russ McRee | ISC Snapshot: Search with SauronEye |
2019-11-08 | Xavier Mertens | Microsoft Apps Diverted from Their Main Use |
2019-10-06 | Russ McRee | visNetwork for Network Data |
2019-08-21 | Russ McRee | KAPE: Kroll Artifact Parser and Extractor |
2019-07-16 | Russ McRee | Commando VM: The Complete Mandiant Offensive VM |
2019-04-05 | Russ McRee | Beagle: Graph transforms for DFIR data & logs |
2019-02-05 | Rob VandenBrink | Mitigations against Mimikatz Style Attacks |
2018-10-17 | Russ McRee | RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence |
2018-06-16 | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2012-04-23 | Russ McRee | Emergency Operations Centers & Security Incident Management: A Correlation |
2011-03-25 | Kevin Liston | APT Tabletop Exercise |
2010-01-22 | Mari Nichols | Pass-down for a Successful Incident Response |
2010-01-14 | Bojan Zdrnja | DRG (Dragon Research Group) Distro available for general release |
2009-03-22 | Mari Nichols | Dealing with Security Challenges |