Log Analysis Tooling

The following pages will include but are not limited to:

  • Network analysis

  • Threat hunting

  • Signature analysis and building

  • Command Line Fu with different tools

Yara

Zeek

Last updated