PinnedD.HaddadinOSINT Team15 tools you should know as a Security AnalystWhether you’re looking to break into cyber security, already working in a SOC, penetration tester or consulting, it’s essential to know…Apr 16, 20233Apr 16, 20233
D.HaddadRecovering Files from a Dead PCHave you ever found yourself in a situation where you need to retrieve important files from your laptop or desktop PC, but it just won’t…Jul 8Jul 8
D.HaddadinOSINT Team20 Tools You Should Know as a Security AnalystMy last article “15 Tools you should know as a security analyst” turned out to be well received by many viewers. Such success prompted me…Mar 193Mar 193
D.HaddadinOSINT TeamOSINT Diaries: Hunting a Cyber BullyImage generated by Bing AIAug 8, 20231Aug 8, 20231
D.HaddadBrute Forcing RDP & How to MitigateWindows Remote Desktop Protocol (RDP) is commonly used by system administrators for remote access. It enables remote display and input for…Sep 26, 2022Sep 26, 2022
D.HaddadinOSINT TeamSOC Exercises: Tracing Threats Through EmailsIf you’re considering a career in cyber security, now has never been a better time. Typically, one of the entry level roles in this…Apr 27, 2022Apr 27, 2022