SVCHost.exe and Internet Sharing Triage
Investigating suspicious svchost.exe behavior and Internet Connection Sharing during malware triage
Investigating suspicious svchost.exe behavior and Internet Connection Sharing during malware triage
A practical guide to implementing threat hunting in a SOC environment and moving beyond reactive detection
Using Malleable C2 profiles and C2 Concealer to bypass network-based detection of Cobalt Strike beacons
Complete guide to installing and configuring Elastic SIEM with EDR capabilities
Using Volatility 3 for memory forensics to analyze malware-infected systems
Step-by-step analysis of a multi-stage fileless malware campaign delivering Cobalt Strike beacon
Configure Filebeat to ship Zeek network logs to ELK Stack for home network monitoring
Build a home network monitoring lab using Zeek IDS and ELK Stack for traffic analysis
Understanding and exploiting Local File Inclusion vulnerabilities through practical pentesting
Analyzing malicious Office documents using OLE Tools and CyberChef for static analysis