- π Threat Hunting
- π‘ Detection Engineering Tips
- π° Detection Lists
- π DFIR Artifacts Insights
- π§ Purple Teaming
- ποΈ Event Logs Analysis
- π My Detection Lists for SOC/DFIR
- π§ͺ PurpleTeam scripts and notes
- π Threat Intelligence Reports Database
- π Threat Hunting artifacts
- π οΈ Threat Hunting yara rules
- π§ Threat Hunting sigma rules
- Threat Hunting - Suspicious Named pipes
- Event Log Manipulations - Time slipping
- Threat Hunting - Suspicious Service names
- Threat Hunting - Suspicious User-agents
- Detecting DNS over HTTPS
- Threat Hunting - Suspicious TLDs
- OSINT - Catching my hacker via leaked datases
- Detecting DLL Hijacking techniques from HijackLibs With Splunk
- How Threat Actors use Pastebin
- Detecting Phishing attempts with DNSTWIST
- File Integrity monitoring with Auditd
- How Threat Actors use Github
- Detecting Browser extensions installations
- C2 Hiding in plain sight
- Detecting PSEXEC and similar tools
- Detecting Phishing attempts with Wetransfer
- Detecting HTML smuggling Phishing attempts
- More content on Medium and Twitter/BlueSky