• Home
  • Articles
  • Tools
  • Vloggers
  • Support


  • Apple Mac OSX Security attributes
  • Aspects of the OSX environment that are of interest to security practitioners

  • Sliver C2 framework Apple Mac implant
  • The setup of open-source Sliver C2 framework to exploit Macbooks via an implant

  • Trickbot Forensic Analysis
  • Trickbot malware framework analysis and write up

  • Foresnics Volatility, reg ripper and timelines
  • Digital forensics and the volatility framework

  • Incident Response Triage
  • The lifecycle of incident response with triaging and analysis fully explained

  • Elasticsearch ELK and packetbeats integration with BRO
  • Elastic Stack system based on BRO logging detailed

  • Windows Event Forwarding WEF centralisation
  • Windows Server WEF configuration explained clearly within one piece

  • Monero Cryptojacking
  • A detailed breakdown article written on Monero mining and crypto-jacking

  • Suricata rule writing
  • Setup Suricata and write test rules before implementing IDS rules

  • BRO IDS setup and usage
  • BRO aka ZEEK logging on a SPAN network setup explained

  • Malware Globe
  • An implementation of encom globe to display Geo IP data of C&C intelligence

  • Network Segmentation
  • A summary of the benefits of LAN network segmentation

  • SIET Cisco Smart Install Vulnerability
  • A breakdown of the Cisco device VSTACK vulnerability and its exploitation

  • Malware Globe
  • An implementation of encom globe to display Geo IP data of C&C intelligence

  • Shodan search toolset explained
  • Shodan DORKS explained and listed

  • Threat Intelligence Summit 2018
  • A rundown of all presentations and talks from a 2018 summit

  • RPF/Access list/IP Spoofing prevention
  • RPF/Access list/IP Spoofing prevention

  • Supertimelining
  • E01 image inevistation and supertimeline creation with KAPE









    greenHosting