2021-01-19 | Russ McRee | Gordon for fast cyber reputation checks |
2020-10-23 | Russ McRee | Sooty: SOC Analyst's All-in-One Tool |
2020-08-12 | Russ McRee | To the Brim at the Gates of Mordor Pt. 1 |
2020-06-30 | Russ McRee | ISC Snapshot: SpectX IP Hitcount Query |
2020-04-21 | Russ McRee | SpectX: Log Parser for DFIR |
2020-02-27 | Xavier Mertens | Offensive Tools Are For Blue Teams Too |
2020-01-21 | Russ McRee | DeepBlueCLI: Powershell Threat Hunting |
2019-11-29 | Russ McRee | ISC Snapshot: Search with SauronEye |
2019-11-08 | Xavier Mertens | Microsoft Apps Diverted from Their Main Use |
2019-10-06 | Russ McRee | visNetwork for Network Data |
2019-08-21 | Russ McRee | KAPE: Kroll Artifact Parser and Extractor |
2019-07-16 | Russ McRee | Commando VM: The Complete Mandiant Offensive VM |
2019-04-05 | Russ McRee | Beagle: Graph transforms for DFIR data & logs |
2019-02-05 | Rob VandenBrink | Mitigations against Mimikatz Style Attacks |
2018-10-17 | Russ McRee | RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence |
2018-06-16 | Russ McRee | Anomaly Detection & Threat Hunting with Anomalize |
2012-04-23 | Russ McRee | Emergency Operations Centers & Security Incident Management: A Correlation |
2011-03-25 | Kevin Liston | APT Tabletop Exercise |
2010-01-22 | Mari Nichols | Pass-down for a Successful Incident Response |
2010-01-14 | Bojan Zdrnja | DRG (Dragon Research Group) Distro available for general release |
2009-03-22 | Mari Nichols | Dealing with Security Challenges |