FivePM – Threat Hunter
It’s 4:55 PM. You’re done for the day. Then — *ping* — “Possible compromise.”Meet **FivePM**: the...

It’s 4:55 PM. You’re done for the day. Then — *ping* — “Possible compromise.”Meet **FivePM**: the...
I’ve just released a new tool: CrowdStrike AID Timeliner.This script helps investigators quickly build timelines around...
In digital forensics and incident response (DFIR), one recurring pain point I’ve seen is managing the...
Streamlining Windows Event Log Analysis with My Hayabusa Scanner Menu ToolFor many DFIR analysts, hunting through...
Recently i begun setting up a home lab with an Elasticsearch server and a seperate vm...
As a cybersecurity enthusiast, I’m always exploring ways to streamline digital forensics and incident response workflows....