top of page
Blog
Search


Unlocking the Windows Registry: A Hidden Goldmine for Cyber Threat Detection 🔒🛡️
A guide to Detecting and Mitigating Registry-Based Persistence Mechanisms The Windows Registry is often an underutilized asset in the...
Oct 28, 20244 min read


Building a File Integrity Monitoring Tool with PowerShell
Introduction Hey everyone! 👋 I'm excited to share a project I've been working on that's both a fun challenge and a crucial tool in...
Oct 20, 20248 min read


Microsoft Sentinel Detection Lab
Welcome to the Microsoft Sentinel and Honey pot detection lab. Please note that this lab includes troubleshooting steps I had to do along...
Oct 14, 202411 min read
bottom of page