Zeroska
  • ๐ŸฑZeroska - The Bold
  • Computer/Cyber Security
    • โญFresh off the boat - for new Blue Teamer/ SOC Analyst
    • ๐Ÿ’€Necromancer (DFIR)
      • ๐Ÿ•ต๏ธDFIR and DFIR case
        • ๐Ÿ—ƒ๏ธCase Files
          • Misconfiguration 0x01
      • ๐Ÿ“”My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • ๐Ÿ“”Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • ๐Ÿง™โ€โ™‚๏ธDefense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • ๐Ÿ’™My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • ๐ŸญICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • ๐ŸฅทThreat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • ๐Ÿ˜’Computer and Technology
    • My Home Lab Setup
    • ๐ŸดELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • ๐ŸงLinux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • ๐Ÿ“ฆContainers
      • Docker container logs is quite big
      • Worth Reading
    • ๐Ÿช Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • ๐ŸณPredators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • ๐Ÿ“ฆNetwork Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • ๐ŸŽตIn my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - ฤแป“ รกn hฦฐแป›ng ngร nh A "Hแปฅt" cแปงa tรดi
Powered by GitBook