2easy: Logs Marketplace on The Rise
KELA’s analysis of the market finds that RedLine infostealer is the most popular choice for the vendors – with over 50% of the machines offered for sale on the market being infected with RedLine....
KELA’s analysis of the market finds that RedLine infostealer is the most popular choice for the vendors – with over 50% of the machines offered for sale on the market being infected with RedLine....
Windows event logs are a ledger of the system’s activities. Forensic investigators rely on these records, sometimes as the main source of evidence, to create a timeline of events of interest. click here to...
BeaconEye scans running processes for active CobaltStrike beacons. When processes are found to be running beacon, BeaconEye will monitor each process for C2 activity. How it works BeaconEye will scan live processes or MiniDump...
Twitch Chat is a part of Twitch using which one can interact with their viewers during the live stream. When you live stream, you need to know what your viewers are talking about, which...
Continuing with cracking down on cybercriminals, this time, the agencies have taken down an important… DoubleVPN Servers And Logs Seized In Joint EU Law Enforcement Operation on Latest Hacking News. click here to read...
Once more, the well-known REvil ransomware has elevated its attack vector to change the target victim’s login password in order to reboot the computer into Windows Safe Mode. click here to read full Article...
Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. Setup Step 1: Install Python 3 apt-get install python3-pip Step 2: Clone the Repository git clone https://github.com/A3h1nt/Subcert.git Step...
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover...
The unsecured database belonging to American cable and internet giant Comcast included dashboard permissions, logging, client IPs, @comcast email addresses, and hashed passwords. Click here for image source link and to read full Article...
[*] An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server. Installation RedShell runs on Python 3. It also requires a Cobalt Strike client installed...
A new research from Trend Micro revealed that cybercriminals are employing cloud companies to speed up their attacks, in flip lowering the quantity of time to discover and answer to a breach. Impression and...
DeepBlueCLI – a PowerShell Module for Threat Hunting via Windows Event Logs Eric Conrad, Backshore Communications, LLC deepblue at backshore dot net Twitter: @eric_conrad http://ericconrad.com Sample evtx files are in the .evtx directory Usage:...