Extracting Attack Behavior from Threat Reports
Download pcap files from http://www.malware-traffic-analysis.net/
Intelligent threat hunter and phishing servers
Collection of Suricata rule sets that I use modified to my environments.
Quick SOC L1 ticket structure
An ongoing & curated collection of awesome software best practices and r...
Hide an IP address in scripts by hex/decimal conversions
Process Hollowing demonstration & explanation