1vs1 (1) DFIR (10) OSINT (1) dev (3) devops (1) lab (5) learning (1) linux (3) organization (5) review (6) threathunting (3) threatintel (2) tutorial (16) windows (4)

 1vs1 (1)

Encoding vs. Encryption vs. Hashing

 DFIR (10)

Blue Team Labs - Deep Blue
How to investigate a web attack
Hunt for a QBot infrastructure
My favorite OSINT shortcuts
How ransomware works
CyberDefenders CyberCorp Case 2 - Write-Up Part 3
CyberDefenders CyberCorp Case 2 - Write-Up Part 2
CyberDefenders CyberCorp Case 2 - Write-Up Part 1
CyberDefenders Malware Traffic Analysis #1 - Write-Up
Concepts you need to know when starting on a SOC

 OSINT (1)

TweetDeck for Security Researchers

 dev (3)

How to monitor Telegram
How to build a simple Slack bot with Python
Setup Your Personal Website For Free

 devops (1)

How to run cronjobs

 lab (5)

Cyber lab for high-school students
CyberDefenders CyberCorp Case 2 - Write-Up Part 3
CyberDefenders CyberCorp Case 2 - Write-Up Part 2
CyberDefenders CyberCorp Case 2 - Write-Up Part 1
CyberDefenders Malware Traffic Analysis #1 - Write-Up

 learning (1)

Threat Hunting for Beginners

 linux (3)

Setup a keyboard shortcut to paste text
Customize your XFCE menu
Encoding vs. Encryption vs. Hashing

 organization (5)

Finding the perfect Markdown note-taking app
My favorite OSINT shortcuts
Setup a keyboard shortcut to paste text
Customize your XFCE menu
Tools I Used For My MSc Thesis

 review (6)

Cyber lab for high-school students
About Social Engineering
Threat Hunting for Beginners
2022 Review
2021 Review
Mentorship Experience Review

 threathunting (3)

TweetDeck for Security Researchers
Threat Hunting for Beginners
Hunt for a QBot infrastructure

 threatintel (2)

How to monitor Telegram
TweetDeck for Security Researchers

 tutorial (16)

Cyber lab for high-school students
How to investigate a web attack
How to run cronjobs
How to monitor Telegram
Hunt for a QBot infrastructure
How to build a simple Slack bot with Python
CyberDefenders CyberCorp Case 2 - Write-Up Part 3
CyberDefenders CyberCorp Case 2 - Write-Up Part 2
CyberDefenders CyberCorp Case 2 - Write-Up Part 1
CyberDefenders Malware Traffic Analysis #1 - Write-Up
Setup a keyboard shortcut to paste text
Customize your XFCE menu
Encoding vs. Encryption vs. Hashing
Log4Shell
Plan a Project Hand-over
Setup Your Personal Website For Free

 windows (4)

CyberDefenders CyberCorp Case 2 - Write-Up Part 3
CyberDefenders CyberCorp Case 2 - Write-Up Part 2
CyberDefenders CyberCorp Case 2 - Write-Up Part 1
CyberDefenders Malware Traffic Analysis #1 - Write-Up