- 📖 I’m currently working on threat hunting
- 📘 I’m currently learning everything 🤣
- 🎭 I’m looking to explore purple teaming
- ☑️ 2023 Goals: Contribute more to Open Source projects
- Threat Hunting with VirusTotal - Introduction to VT Intelligence
- Memory Forensics Made Easy, with SANS and Intezer
- 🔴 Malware Mondays Episode 01 - Identifying Malicious Activity in Process Monitor (ProcMon) Data
- Analyzing Windows Malware on Linux: Getting Started Tips and Examples
- Shortcuts for Understanding Malicious Scripts
- The State of Malware Analysis: Advice from the Trenches
- Bypass Windows Defender 2024 - Windows Cyber Security
- LSASS Dumping Using DFIR Tools
- Memory Forensics with Volatility | PDF Malware Analysis with Any.Run | Cyber Incident Response
- Methods for Finding Threat Signals - Greg Lesnewich @ NetNoiseCon
- cowbe0x004 starred smbclient-ng
- cowbe0x004 starred gcpwn
- cowbe0x004 starred GCP-IAM-Privilege-Escalation
- cowbe0x004 starred PPID-Spoofing
- cowbe0x004 starred PWA-Phishing
- cowbe0x004 starred msitools
- cowbe0x004 starred SafeLine
- cowbe0x004 starred SigmaPotato
- cowbe0x004 starred TotalRecall
- cowbe0x004 starred msg-extractor
- RT Devansh (⚡, 🥷): If you, like many, think relying just on
cat
command's output is enough to be sure about the integrity of a bash file. Think ... - RT Alh4zr3d: Red Teamers: Windows Subsystem for Linux (WSL) is more and more common, especially on dev workstations. Don't neglect it! WSL rev shell: ...
- RT Grzegorz Tworek: Need an almost invisible, post-exploitation, persistent, fileless, LPE backdoor? There are many, but this one looks really beautif...
- RT Mr. Rc: Are you interested in learning reverse engineering in 2023? I've spent the this year studying RE, and I want to share all the resources tha...
- RT Oliver Lyak: Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential G...