cyberred
Here are 17 public repositories matching this topic...
When conducting an investigation on a Windows machine there are 8 phase to go through, today we’ll discuss the first ‘Collecting Volatile Information’, and the rest will be explained in future topics
-
Updated
Sep 24, 2023
Investigate Attack Patterns using SIEM, Sysmon Utility and MITRE ATT&CK
-
Updated
Aug 30, 2023
Useful Wire shark command for threat hunting
-
Updated
Aug 30, 2023
Starting your first threat hunting
-
Updated
Sep 1, 2023
make valid SSL with acme
-
Updated
Aug 30, 2023 - Shell
13 Essential Things to Know about PowerShell Download Cradles
-
Updated
Sep 21, 2023
DNS Incident Response
-
Updated
Aug 30, 2023
Make CA root server and Certificate for web Server with openssl Script.
-
Updated
Jan 10, 2024 - Shell
making a Tunnel between two VPS that one of which is in Iran and another VPS occur on a foreign country and send the traffics to a foreign data center and use free internet. with this bash script, you can make a tunnel between two servers
-
Updated
Aug 30, 2023 - Shell
The Elastic stack (ELK) powered by Docker and Compose.
-
Updated
Sep 10, 2023 - Shell
Adversaries commonly abuse the Local Security Authority Subsystem Service (LSASS) to dump credentials for privilege escalation, data theft, and lateral movement. The process is a fruitful target for adversaries because of the sheer amount of sensitive information it stores in memory.
-
Updated
Aug 31, 2023
Active Directory Auditing Best Practices
-
Updated
Apr 14, 2025
All About Me.
-
Updated
Feb 14, 2025
Apache2 Modsecurity
-
Updated
Aug 30, 2023
Windows Event Log Analysis & Incident Response Guide
-
Updated
Aug 30, 2023
Improve this page
Add a description, image, and links to the cyberred topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cyberred topic, visit your repo's landing page and select "manage topics."