PinnedwhoamiinSystem WeaknessIncident Response Tool — ChainsawRapid threat hunting through Chainsaw detection and Sigma rulesAug 18, 2023Aug 18, 2023
PinnedwhoamiinSystem WeaknessDNS Tunneling Detection—RITAI hope everything is going well in your life journey!!! Here is my research and writeup, let’s analyze malware DNS tunnelingJun 27, 20231Jun 27, 20231
PinnedwhoamiinSystem WeaknessMemory Forensics — StuxnetLet’s analyze infected memory by a powerful worm in 2010, “Stuxnet”.Jul 6, 20231Jul 6, 20231
whoamiThreat Hunting — FalconEyeLet’s hunt threats within Windows AD environmentOct 12, 2023Oct 12, 2023
whoamiHow to build a Fake Network?The purpose of building the fake network is to capture malware C & C server communication or behaviour for malware analysis purposeSep 22, 20232Sep 22, 20232
whoamiFlare VM — Windows Malware AnalysisLet’s installing Flare VM, a Windows Malware Analysis DistributionSep 19, 2023Sep 19, 2023
whoamiSecurity Blue Team Level 1 — JourneyBlue Team Level 1 Certification ReviewSep 2, 2023Sep 2, 2023
whoamiinSystem WeaknessMalware Analysis & Network Forensics — HawkEyeMalware Analysis and Network InvestigationAug 9, 2023Aug 9, 2023
whoamiThreat Hunting — CyberCorp Case 2Let’s hunt a real case of a cybersecurity incident. Threat hunting is a proactive action to identify threats within organizations.Jun 14, 20231Jun 14, 20231