How To Use This Site
A Repo for Cluttered Minds. Use each card as a review topic for notebooks. Topics Covered --- Threat Hunting Forensics Cloud Active Directory Appsec Stuff Radio Other Projects --- Threat Hun...
A Repo for Cluttered Minds. Use each card as a review topic for notebooks. Topics Covered --- Threat Hunting Forensics Cloud Active Directory Appsec Stuff Radio Other Projects --- Threat Hun...
Small Book 1 Formal Titles: Threat Detection Forensics Enterprise Security Security Engineering Web Aoo Pentesting/Bug Bounties Email Research Radio/WiFi SCADA Satellites/Deepspace REGEX (\S)(M)...
Forests, Trees, and Domains [Screenshot of AD] Active Directory’s Logical Divisions Domains: Group of network objects (ex.) with the same Active Directory database Tree: a group of domains...
rex field = System_Props_XML (\S)(HTTP)(\s) (\S \s) (?\SM)"
duffle bag for pen test Raw Notes Raw Notes 1 Recon nmap scan reveals two open ports Port Status Info 80 open http (web applicatio...
Raw Notes Raw Notes 1 Raw Notes 2 Raw Notes 3 Raw Notes 4 Tutorials Used https://github.com/weslambert/velociraptor-docker Ironcailly this had nothing to do with docker initially Setup E...
Annotations and quick copy-pastes for MemprocFS, based on 13Cubed’s tutorial. I don’t see a whole lot of other people using this tool but it has been useful so I guess here we are. TLDR SpeedRun C...
Annotations of various tutorials on starting out in Volatility, a python-based tool for Host-Based Forensics and Incident Responders. This tool is for digital investigation, and requires the reposi...
On The Nature of Tarnished Souls You may have come here from my art site. This is a documentation as well of the pages of this tome Eileen The Crow Pages Shop
“Good Hunter, lost in the nightmare. What do you think of that beastly legend and those ailing wards of the church?… I know what you did to them… It’s not y our fault. The nightmare held them, an...