April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: threat hunting (page 2)

Tag Archives: threat hunting

Software

PasteHunter

PasteHunter is a Python3 application that is designed to query a collection of sites that host publicliy pasted data. For al…

Books

The Endgame Guide To Threat Hunting: Practitioner’s Edition

Threat hunting is the process of actively looking for signs of malicious activity within enterprise networks without prior k…

Software

Invoke-Adversary – Simulating Adversary Operations

Invoke-Adversary is a PowerShell script that helps you to evaluate security products and monitoring solutions based on how w…

How To

C2 Hunting

Here is the latest post by Jack Crook (@jackcr) in which he discusses detecting and/or hunting for C2 traffic. You can …

Books

Hunt Evil: Your Practical Guide to Threat Hunting

This eBook will guide you through how to assess and improve your threat hunting capabilities, how to prioritize what to hunt…

How To

Splunking the Endpoint: Threat Hunting with Sysmon

In this post Michael Haag describes utilizing Sysmon to perform threat hunting. You will learn how to setup the to…

Page 2 of 212

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account