Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should be used on...
Tag - Incident Response
How it works? 1- Build server 2- Connect with admin and client to server 3- To collect information, send the request to the server through the admin, and then...
Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries. To learn more about Velociraptor, read the...
…a simple, self-contained modular host-based IOC scanner Spyre is a simple host-based IOC scanner built around the YARA pattern matching engine and other...
Do you want to get threat intelligence data about a file, an IP or a domain? Do you want to get this kind of data from multiple sources at the same time using...
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does...
There are hundreds of promising torrent sites – but many don’t work, and most aren’t safe. So how do you get your torrent fix without wasting your time on...
MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response...
The Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual file system. Easy trivial point and click memory...
Google announced some major changes for its Android mobile operating system in October after the European Commission hit the company with a record $5 billion...