Category Archives: Incident Response
PEview – Tool to Investigate PE Files
PEview provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files.
Yeti – Your Everyday Threat Intelligence
Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. the platform will also automatically enrich observables (e.g. resolve domains, geolocate IPs) so that you don’t have to. Yeti
LogonTracer – Investigate Malicious Logon Using Event Logs
LogonTracer is a tool to investigate malicious logon by visualizing and analyzing Windows Active Directory event logs. This tool associates a host name (or an IP address) and account name found in logon-related events and displays it as a graph.
AppNetworkCounter – List Application Network Usage
AppNetworkCounter is a simple tool for Windows that counts and displays the number of TCP/UDP bytes and packets sent and received by every application on
TurnedOnTimesView – List PC Running Time Ranges
TurnedOnTimesView is a simple tool that analyses the event log of Windows operating system, and detects the time ranges that your computer was turned on.
Panther – Detect Threats and Improve Cloud Security
Panther is an open source platform designed to bring security visibility at cloud-scale. It's a modern and flexible solution to the challenges
LogFusion – Real-Time Log Monitoring Made Easy
LogFusion is a useful program for monitoring log files, which simplifies parsing information and highlighting required fields in logs.