[sc name=”ad_1″] Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your...
Tag - Incident Response
[sc name=”ad_1″] How it works? 1- Build server 2- Connect with admin and client to server 3- To collect information, send the request to the server...
[sc name=”ad_1″] Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries. To learn more...
[sc name=”ad_1″] …a simple, self-contained modular host-based IOC scanner Spyre is a simple host-based IOC scanner built around the YARA...
[sc name=”ad_1″] Do you want to get threat intelligence data about a file, an IP or a domain? Do you want to get this kind of data from multiple...
[sc name=”ad_1″] A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written...
There are hundreds of promising torrent sites – but many don’t work, and most aren’t safe. So how do you get your torrent fix without wasting your time on...
[sc name=”ad_1″] MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics...
[sc name=”ad_1″] The Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual file system. Easy...
[sc name=”ad_1″] Google announced some major changes for its Android mobile operating system in October after the European Commission hit the...