The following pages will include but are not limited to:
Network analysis
Threat hunting
Signature analysis and building
Command Line Fu with different tools
Yara
Zeek
Last updated 2 years ago