Leveraging ChatGPT for Blue Team in Cyber SecurityAttackers and defenders are constantly engaged in a battle for cybersecurity. Blue teams, comprising cybersecurity professionals…Oct 14, 2023Oct 14, 2023
Windows Triaging with Powershell — Part 2: Artifacts CollectionThe current blog is in continuation of Part 1 of Windows Triaging with Powershell. Part 1 described how the Powershell functions can be…May 10, 20221111May 10, 20221111
Published inOSINT TeamIntelligence Gathering with Open-Source ToolsIntelligence gathering is becoming increasingly important to organizations today. In addition to the Internet, they are also using the Deep…May 7, 202289May 7, 202289
Windows Triaging with Powershell — Part 1: Parsing Event LogsThis is the part 1 for Triaging a Windows system with Powershell. On a Windows machine, Event Logs play an important role in determining a…Apr 17, 202295Apr 17, 202295
Windows Memory Forensics using Open Source ToolsMemory Forensics is forensic analysis of computer’s memory dump, according to Wikipedia. In short, first we have to create the dump of the…Jan 5, 2022961Jan 5, 2022961
Mobile Lock Cracking/Brute-forcing with AT-Tiny85For a long time, I’ve been wondering to crack mobile lock screen passwords. Well, with use of many Mobile Forensic Tools and Password…Dec 20, 202153Dec 20, 202153
Digital ForensicsThe term “Forensics” itself tells that we are going to deal with some evidence that we are supposed to submit in court and also maintaining…Dec 14, 202158Dec 14, 202158