HolisticInfoSec
  • Blog
  • toolsmith
  • Menu
    Best Practices Events In The News Publications Simplicity Templates
  • About
  • Tags
HolisticInfoSec

Tags


blue team 19

View all
Sandfly Security EDA with CISSM Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study toolsmith snapshot: Adversary Simulation with Sim Security Detection and Response Alert Output Usability Survey toolsmith snapshot: Gordon - cyber reputation checks toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool To the Brim at the Gates of Mordor Toolsmith Snapshot: SpectX IP Hitcount Query SpectX: Log Parser for DFIR Chain Reactor: Simulate Adversary Behaviors on Linux DeepBlueCLI: Powershell Threat Hunting DFIR Redefined Part 3: visNetwork for Network Data KAPE: Kroll Artifact Parser and Extractor RedHunt Linux - Adversary Emulation & Threat Hunting

dfir 15

View all
Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study toolsmith snapshot: Adversary Simulation with Sim Security Detection and Response Alert Output Usability Survey toolsmith snapshot: Gordon - cyber reputation checks toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool To the Brim at the Gates of Mordor Toolsmith Snapshot: SpectX IP Hitcount Query SpectX: Log Parser for DFIR DeepBlueCLI: Powershell Threat Hunting DFIR Redefined Part 3: visNetwork for Network Data toolsmith snapshot: r-cyber with rud.is

soc 9

View all
Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study toolsmith snapshot: Adversary Simulation with Sim Security Detection and Response Alert Output Usability Survey toolsmith snapshot: Gordon - cyber reputation checks toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool

dart 6

View all
Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study Security Detection and Response Alert Output Usability Survey

data science 6

View all
AI-Powered Knowledge Graph Generator & APTs toolsmith snapshot: Protect AI ModelScan EDA with CISSM EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

ti 6

View all
Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study Security Detection and Response Alert Output Usability Survey

toolsmith 6

View all
AI-Powered Knowledge Graph Generator & APTs OctoSQL & Vulnerability Data toolsmith snapshot: Protect AI ModelScan Sandfly Security EDA with CISSM HolisticInfoSec

r 5

View all
EDA with CISSM DFIR Redefined Part 3: visNetwork for Network Data toolsmith snapshot: r-cyber with rud.is gganimate: Animate YouR Security Analysis Shodan As A Verb - Find The Fail Before It Finds You

detection 4

View all
LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study Detection Development: The Research Cycle & NIST CSF

red team 4

View all
Chain Reactor: Simulate Adversary Behaviors on Linux Toolsmith Snapshot: Search with SauronEye Commando VM: The Complete Mandiant Offensive VM RedHunt Linux - Adversary Emulation & Threat Hunting

visualization 4

View all
AI-Powered Knowledge Graph Generator & APTs Sandfly Security EDA with CISSM Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

adversary emulation 3

View all
toolsmith snapshot: Adversary Simulation with Sim Chain Reactor: Simulate Adversary Behaviors on Linux RedHunt Linux - Adversary Emulation & Threat Hunting

linux 3

View all
Sandfly Security RedHunt Linux - Adversary Emulation & Threat Hunting Toolsmith Snapshot: Bashark - Linux post-exploitation toolkit

python 3

View all
AI-Powered Knowledge Graph Generator & APTs toolsmith snapshot: Protect AI ModelScan ViperMonkey: VBA maldoc deobfuscation

ai 2

View all
AI-Powered Knowledge Graph Generator & APTs toolsmith snapshot: Protect AI ModelScan

att&ck 2

View all
To the Brim at the Gates of Mordor RedHunt Linux - Adversary Emulation & Threat Hunting

epss 2

View all
OctoSQL & Vulnerability Data EPSScall - An Exploit Prediction Scoring System App

ggplot2 2

View all
EDA with CISSM gganimate: Animate YouR Security Analysis

spectx 2

View all
Toolsmith Snapshot: SpectX IP Hitcount Query SpectX: Log Parser for DFIR

spectx4dfir 2

View all
Toolsmith Snapshot: SpectX IP Hitcount Query SpectX: Log Parser for DFIR

adobe 1

View all
LotL Classifier tests for shells, exfil, and miners

agentless 1

View all
Sandfly Security

auditd 1

View all
Chain Reactor: Simulate Adversary Behaviors on Linux

aws 1

View all
Prowler v3 - AWS & Azure security assessments

azure 1

View all
Prowler v3 - AWS & Azure security assessments

beagle 1

View all
Beagle: Graph transforms for DFIR data & logs

brim 1

View all
To the Brim at the Gates of Mordor

chainsaw 1

View all
Chainsaw

classifier 1

View all
LotL Classifier tests for shells, exfil, and miners

cloud 1

View all
Prowler v3 - AWS & Azure security assessments

commando vm 1

View all
Commando VM: The Complete Mandiant Offensive VM

csf 1

View all
Detection Development: The Research Cycle & NIST CSF

cve 1

View all
OctoSQL & Vulnerability Data

cvss 1

View all
OctoSQL & Vulnerability Data

deepbluecli 1

View all
DeepBlueCLI: Powershell Threat Hunting

events 1

View all
Events

exploitability 1

View all
EPSScall - An Exploit Prediction Scoring System App

forensics 1

View all
KAPE: Kroll Artifact Parser and Extractor

gcp 1

View all
Prowler v3 - AWS & Azure security assessments

gganimate 1

View all
gganimate: Animate YouR Security Analysis

gordon 1

View all
toolsmith snapshot: Gordon - cyber reputation checks

hunting 1

View all
DeepBlueCLI: Powershell Threat Hunting

kape 1

View all
KAPE: Kroll Artifact Parser and Extractor

kev 1

View all
OctoSQL & Vulnerability Data

knowledge graph 1

View all
AI-Powered Knowledge Graph Generator & APTs

kroll 1

View all
KAPE: Kroll Artifact Parser and Extractor

lotl 1

View all
LotL Classifier tests for shells, exfil, and miners

machine learning 1

View all
LotL Classifier tests for shells, exfil, and miners

maldoc 1

View all
ViperMonkey: VBA maldoc deobfuscation

mandiant 1

View all
Commando VM: The Complete Mandiant Offensive VM

mitre 1

View all
To the Brim at the Gates of Mordor

modelscan 1

View all
toolsmith snapshot: Protect AI ModelScan

news 1

View all
In The News

nist 1

View all
Detection Development: The Research Cycle & NIST CSF

oci 1

View all
Prowler v3 - AWS & Azure security assessments

octosql 1

View all
OctoSQL & Vulnerability Data

offensive 1

View all
Commando VM: The Complete Mandiant Offensive VM

pentest 1

View all
Toolsmith Snapshot: Search with SauronEye

pi-hole 1

View all
Toolsmith Snapshot: Ad Blocking With Pi Hole

post-exploitation 1

View all
Toolsmith Snapshot: Bashark - Linux post-exploitation toolkit

publications 1

View all
Publications

pypy 1

View all
ViperMonkey: VBA maldoc deobfuscation

r-cyber 1

View all
toolsmith snapshot: r-cyber with rud.is

red canary 1

View all
Chain Reactor: Simulate Adversary Behaviors on Linux

research cycle 1

View all
Detection Development: The Research Cycle & NIST CSF

sandfly 1

View all
Sandfly Security

sauroneye 1

View all
Toolsmith Snapshot: Search with SauronEye

search 1

View all
Toolsmith Snapshot: Search with SauronEye

security alert 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

serialization 1

View all
toolsmith snapshot: Protect AI ModelScan

shodan 1

View all
Shodan As A Verb - Find The Fail Before It Finds You

sigma 1

View all
Zircolite vs Defense Evasion & Nobellium FoggyWeb

sim 1

View all
toolsmith snapshot: Adversary Simulation with Sim

simplicity 1

View all
Simplicity

solarwinds 1

View all
toolsmith snapshot: Gordon - cyber reputation checks

sooty 1

View all
toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool

sql 1

View all
OctoSQL & Vulnerability Data

sunburst 1

View all
toolsmith snapshot: Gordon - cyber reputation checks

survey 1

View all
Security Detection and Response Alert Output Usability Survey

templates 1

View all
Templates

tensorflow 1

View all
toolsmith snapshot: Protect AI ModelScan

text alert output 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

threat hunting 1

View all
RedHunt Linux - Adversary Emulation & Threat Hunting

threat intelligence 1

View all
RedHunt Linux - Adversary Emulation & Threat Hunting

user acceptance 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

user behavior 1

View all
toolsmith snapshot: Adversary Simulation with Sim

user experience 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

vba 1

View all
ViperMonkey: VBA maldoc deobfuscation

vipermonkey 1

View all
ViperMonkey: VBA maldoc deobfuscation

visnetwork 1

View all
DFIR Redefined Part 3: visNetwork for Network Data

visual alert output 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

vulnerabilities 1

View all
OctoSQL & Vulnerability Data

yeti 1

View all
RedHunt Linux - Adversary Emulation & Threat Hunting

zircolite 1

View all
Zircolite vs Defense Evasion & Nobellium FoggyWeb

zq 1

View all
To the Brim at the Gates of Mordor

Russ McRee, Ph.D.  • © 2026  •  HolisticInfoSec

Hugo v0.154.5 powered  •  Theme Beautiful Hugo adapted from Beautiful Jekyll