Aditya PratapLeveraging ChatGPT for Blue Team in Cyber SecurityAttackers and defenders are constantly engaged in a battle for cybersecurity. Blue teams, comprising cybersecurity professionals…9 min read·Oct 14, 2023----
Aditya PratapWindows Triaging with Powershell — Part 2: Artifacts CollectionThe current blog is in continuation of Part 1 of Windows Triaging with Powershell. Part 1 described how the Powershell functions can be…16 min read·May 10, 2022--1--1
Aditya PratapinOSINT TEAMIntelligence Gathering with Open-Source ToolsIntelligence gathering is becoming increasingly important to organizations today. In addition to the Internet, they are also using the Deep…13 min read·May 7, 2022----
Aditya PratapWindows Triaging with Powershell — Part 1: Parsing Event LogsThis is the part 1 for Triaging a Windows system with Powershell. On a Windows machine, Event Logs play an important role in determining a…12 min read·Apr 17, 2022----
Aditya PratapWindows Memory Forensics using Open Source ToolsMemory Forensics is forensic analysis of computer’s memory dump, according to Wikipedia. In short, first we have to create the dump of the…10 min read·Jan 5, 2022--1--1
Aditya PratapMobile Lock Cracking/Brute-forcing with AT-Tiny85For a long time, I’ve been wondering to crack mobile lock screen passwords. Well, with use of many Mobile Forensic Tools and Password…8 min read·Dec 20, 2021----
Aditya PratapDigital ForensicsThe term “Forensics” itself tells that we are going to deal with some evidence that we are supposed to submit in court and also maintaining…1 min read·Dec 14, 2021----