HolisticInfoSec
  • Blog
  • toolsmith
  • Menu
    Best Practices Events In The News Publications Simplicity Templates
  • About
  • Tags
HolisticInfoSec

Tags


blue-team 19

View all
Sandfly Security EDA with CISSM Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study toolsmith snapshot: Adversary Simulation with Sim Security Detection and Response Alert Output Usability Survey toolsmith snapshot: Gordon - cyber reputation checks toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool To the Brim at the Gates of Mordor Toolsmith Snapshot: SpectX IP Hitcount Query SpectX: Log Parser for DFIR Chain Reactor: Simulate Adversary Behaviors on Linux DeepBlueCLI: Powershell Threat Hunting DFIR Redefined Part 3: visNetwork for Network Data KAPE: Kroll Artifact Parser and Extractor RedHunt Linux - Adversary Emulation & Threat Hunting

dfir 15

View all
Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study toolsmith snapshot: Adversary Simulation with Sim Security Detection and Response Alert Output Usability Survey toolsmith snapshot: Gordon - cyber reputation checks toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool To the Brim at the Gates of Mordor Toolsmith Snapshot: SpectX IP Hitcount Query SpectX: Log Parser for DFIR DeepBlueCLI: Powershell Threat Hunting DFIR Redefined Part 3: visNetwork for Network Data toolsmith snapshot: r-cyber with rud.is

soc 9

View all
Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study toolsmith snapshot: Adversary Simulation with Sim Security Detection and Response Alert Output Usability Survey toolsmith snapshot: Gordon - cyber reputation checks toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool

dart 6

View all
Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study Security Detection and Response Alert Output Usability Survey

ti 6

View all
Chainsaw EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study Security Detection and Response Alert Output Usability Survey

data-science 5

View all
toolsmith snapshot: Protect AI ModelScan EDA with CISSM EPSScall - An Exploit Prediction Scoring System App LotL Classifier tests for shells, exfil, and miners Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

r 5

View all
EDA with CISSM DFIR Redefined Part 3: visNetwork for Network Data toolsmith snapshot: r-cyber with rud.is gganimate: Animate YouR Security Analysis Shodan As A Verb - Find The Fail Before It Finds You

detection 4

View all
LotL Classifier tests for shells, exfil, and miners Zircolite vs Defense Evasion & Nobellium FoggyWeb Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study Detection Development: The Research Cycle & NIST CSF

red-team 4

View all
Chain Reactor: Simulate Adversary Behaviors on Linux Toolsmith Snapshot: Search with SauronEye Commando VM: The Complete Mandiant Offensive VM RedHunt Linux - Adversary Emulation & Threat Hunting

toolsmith 4

View all
toolsmith snapshot: Protect AI ModelScan Sandfly Security EDA with CISSM HolisticInfoSec

adversary-emulation 3

View all
toolsmith snapshot: Adversary Simulation with Sim Chain Reactor: Simulate Adversary Behaviors on Linux RedHunt Linux - Adversary Emulation & Threat Hunting

linux 3

View all
Sandfly Security RedHunt Linux - Adversary Emulation & Threat Hunting Toolsmith Snapshot: Bashark - Linux post-exploitation toolkit

visualization 3

View all
Sandfly Security EDA with CISSM Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

attck 2

View all
To the Brim at the Gates of Mordor RedHunt Linux - Adversary Emulation & Threat Hunting

ggplot2 2

View all
EDA with CISSM gganimate: Animate YouR Security Analysis

python 2

View all
toolsmith snapshot: Protect AI ModelScan ViperMonkey: VBA maldoc deobfuscation

spectx 2

View all
Toolsmith Snapshot: SpectX IP Hitcount Query SpectX: Log Parser for DFIR

spectx4dfir 2

View all
Toolsmith Snapshot: SpectX IP Hitcount Query SpectX: Log Parser for DFIR

adobe 1

View all
LotL Classifier tests for shells, exfil, and miners

agentless 1

View all
Sandfly Security

ai 1

View all
toolsmith snapshot: Protect AI ModelScan

auditd 1

View all
Chain Reactor: Simulate Adversary Behaviors on Linux

aws 1

View all
Prowler v3 - AWS & Azure security assessments

azure 1

View all
Prowler v3 - AWS & Azure security assessments

beagle 1

View all
Beagle: Graph transforms for DFIR data & logs

brim 1

View all
To the Brim at the Gates of Mordor

chainsaw 1

View all
Chainsaw

classifier 1

View all
LotL Classifier tests for shells, exfil, and miners

cloud 1

View all
Prowler v3 - AWS & Azure security assessments

commando-vm 1

View all
Commando VM: The Complete Mandiant Offensive VM

csf 1

View all
Detection Development: The Research Cycle & NIST CSF

deepbluecli 1

View all
DeepBlueCLI: Powershell Threat Hunting

epss 1

View all
EPSScall - An Exploit Prediction Scoring System App

events 1

View all
Events

exploitability 1

View all
EPSScall - An Exploit Prediction Scoring System App

forensics 1

View all
KAPE: Kroll Artifact Parser and Extractor

gcp 1

View all
Prowler v3 - AWS & Azure security assessments

gganimate 1

View all
gganimate: Animate YouR Security Analysis

gordon 1

View all
toolsmith snapshot: Gordon - cyber reputation checks

hunting 1

View all
DeepBlueCLI: Powershell Threat Hunting

kape 1

View all
KAPE: Kroll Artifact Parser and Extractor

kroll 1

View all
KAPE: Kroll Artifact Parser and Extractor

lotl 1

View all
LotL Classifier tests for shells, exfil, and miners

machine-learning 1

View all
LotL Classifier tests for shells, exfil, and miners

maldoc 1

View all
ViperMonkey: VBA maldoc deobfuscation

mandiant 1

View all
Commando VM: The Complete Mandiant Offensive VM

mitre 1

View all
To the Brim at the Gates of Mordor

modelscan 1

View all
toolsmith snapshot: Protect AI ModelScan

news 1

View all
In The News

nist 1

View all
Detection Development: The Research Cycle & NIST CSF

oci 1

View all
Prowler v3 - AWS & Azure security assessments

offensive 1

View all
Commando VM: The Complete Mandiant Offensive VM

pentest 1

View all
Toolsmith Snapshot: Search with SauronEye

pi-hole 1

View all
Toolsmith Snapshot: Ad Blocking With Pi Hole

post-exploitation 1

View all
Toolsmith Snapshot: Bashark - Linux post-exploitation toolkit

publications 1

View all
Publications

pypy 1

View all
ViperMonkey: VBA maldoc deobfuscation

r-cyber 1

View all
toolsmith snapshot: r-cyber with rud.is

red-canary 1

View all
Chain Reactor: Simulate Adversary Behaviors on Linux

research-cycle 1

View all
Detection Development: The Research Cycle & NIST CSF

sandfly 1

View all
Sandfly Security

sauroneye 1

View all
Toolsmith Snapshot: Search with SauronEye

search 1

View all
Toolsmith Snapshot: Search with SauronEye

security-alert 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

serialization 1

View all
toolsmith snapshot: Protect AI ModelScan

shodan 1

View all
Shodan As A Verb - Find The Fail Before It Finds You

sigma 1

View all
Zircolite vs Defense Evasion & Nobellium FoggyWeb

sim 1

View all
toolsmith snapshot: Adversary Simulation with Sim

simplicity 1

View all
Simplicity

solarwinds 1

View all
toolsmith snapshot: Gordon - cyber reputation checks

sooty 1

View all
toolsmith snapshot: Sooty - SOC Analyst's All-in-One Tool

sunburst 1

View all
toolsmith snapshot: Gordon - cyber reputation checks

survey 1

View all
Security Detection and Response Alert Output Usability Survey

templates 1

View all
Templates

tensorflow 1

View all
toolsmith snapshot: Protect AI ModelScan

text-alert-output 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

threat-hunting 1

View all
RedHunt Linux - Adversary Emulation & Threat Hunting

threat-intelligence 1

View all
RedHunt Linux - Adversary Emulation & Threat Hunting

user-acceptance 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

user-behavior 1

View all
toolsmith snapshot: Adversary Simulation with Sim

user-experience 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

vba 1

View all
ViperMonkey: VBA maldoc deobfuscation

vipermonkey 1

View all
ViperMonkey: VBA maldoc deobfuscation

visnetwork 1

View all
DFIR Redefined Part 3: visNetwork for Network Data

visual-alert-output 1

View all
Abstract: Improved Security Detection & Response Via Optimized Alert Output - A Usability Study

yeti 1

View all
RedHunt Linux - Adversary Emulation & Threat Hunting

zircolite 1

View all
Zircolite vs Defense Evasion & Nobellium FoggyWeb

zq 1

View all
To the Brim at the Gates of Mordor

Russ McRee, Ph.D.  • © 2025  •  HolisticInfoSec

Hugo v0.115.4 powered  •  Theme Beautiful Hugo adapted from Beautiful Jekyll