Aditya PratapLeveraging ChatGPT for Blue Team in Cyber SecurityAttackers and defenders are constantly engaged in a battle for cybersecurity. Blue teams, comprising cybersecurity professionals…Oct 14, 2023Oct 14, 2023
Aditya PratapWindows Triaging with Powershell — Part 2: Artifacts CollectionThe current blog is in continuation of Part 1 of Windows Triaging with Powershell. Part 1 described how the Powershell functions can be…May 10, 20221May 10, 20221
Aditya PratapinOSINT TeamIntelligence Gathering with Open-Source ToolsIntelligence gathering is becoming increasingly important to organizations today. In addition to the Internet, they are also using the Deep…May 7, 2022May 7, 2022
Aditya PratapWindows Triaging with Powershell — Part 1: Parsing Event LogsThis is the part 1 for Triaging a Windows system with Powershell. On a Windows machine, Event Logs play an important role in determining a…Apr 17, 2022Apr 17, 2022
Aditya PratapWindows Memory Forensics using Open Source ToolsMemory Forensics is forensic analysis of computer’s memory dump, according to Wikipedia. In short, first we have to create the dump of the…Jan 5, 20221Jan 5, 20221
Aditya PratapMobile Lock Cracking/Brute-forcing with AT-Tiny85For a long time, I’ve been wondering to crack mobile lock screen passwords. Well, with use of many Mobile Forensic Tools and Password…Dec 20, 2021Dec 20, 2021
Aditya PratapDigital ForensicsThe term “Forensics” itself tells that we are going to deal with some evidence that we are supposed to submit in court and also maintaining…Dec 14, 2021Dec 14, 2021