TryHackMe | Tactical Detection | WriteUpEstablish a baseline knowledge of tactical detection, leveraging efficient techniques to bolster your security posture16h ago16h ago
Published inT3CHTryHackMe | Advanced ELK Queries | WriteUpSearch large datasets efficiently with advanced queries in Kibana1d ago1d ago
Published inT3CHTryHackMe | EXT Analysis | WriteUpDiscover the forensic basics of the EXT file system3d ago3d ago
Published inT3CHTryHackMe | Custom Alert Rules in Wazuh | WriteUpLearn how to create rules in Wazuh for your environment5d ago5d ago
Published inT3CHTryHackMe | Secret Recipe | WriteUpPerform Registry Forensics to Investigate a case6d ago6d ago
Published inT3CHTryHackMe | Disgruntled | WriteUpUse your Linux forensics knowledge to investigate an incidentFeb 16Feb 16
Published inT3CHTryHackMe | TheHive Project | WriteUpLearn how to use TheHive, a Security Incident Response Platform, to report investigation findingsFeb 15Feb 15
Published inT3CHReviving the ’90s: A Modern Spin on Windows 95 with an Electron AppExperience the Classic OS on macOS, Linux, and Windows in a Faithful EmulationFeb 14Feb 14
Published inT3CHTryHackMe | Intro to Malware Analysis | WriteUpWhat to do when you run into a suspected malwareFeb 14Feb 14
Published inT3CHTryHackMe | Length Extension Attacks | WriteUpLearn how hash functions enable attackers to extend and manipulate data using length extension attacksFeb 12Feb 12