top of page
Blog
Search

Oct 28, 20244 min read
Unlocking the Windows Registry: A Hidden Goldmine for Cyber Threat Detection 🔒🛡️
A guide to Detecting and Mitigating Registry-Based Persistence Mechanisms The Windows Registry is often an underutilized asset in the...
41 views0 comments


Oct 20, 20248 min read
Building a File Integrity Monitoring Tool with PowerShell
Introduction Hey everyone! 👋 I'm excited to share a project I've been working on that's both a fun challenge and a crucial tool in...
67 views0 comments

Oct 14, 202411 min read
Microsoft Sentinel Detection Lab
Welcome to the Microsoft Sentinel and Honey pot detection lab. Please note that this lab includes troubleshooting steps I had to do along...
73 views0 comments
bottom of page