Part 3 -(Persistence) Windows Persistence: A Deep Dive into Scheduled Tasks
Part 2-(Persistence) Windows Services: A Stealthy Avenue for Persistence
Part 1-(Persistence): The Labyrinth of Autorun Locations in Windows
Exploring Malware Persistence: Upcoming Topics
Part 6-(WMI): Hunting Down Malicious WMI Activity
Part 5- (WMI): Unveiling the Persistence of Malicious MOF Files: A Deep Dive into #PRAGMA AUTORECOVER
Part 4-(WMI): The Intricacies of MOF Files: A Gateway for Malicious Infiltration in WMI
Part 3-(WMI): Understanding WMI Event Consumers in Cybersecurity
Part 2 -(WMI) :Detecting WMI-Based Attacks
Part 1 - (WMI): A Dive in its Capabilities and Stealthy Persistence Techniques
Power of Kansa: A Comprehensive Guide to Incident Response and Threat Hunting
Single-line PowerShell commands for analysis
Incident Handlers Checklist and Personalize Windows investigation Cheat Sheet
Incident Response Framework Post-Incident Phase
Incident Response Framework Recovery Phase
Incident Response Framework Eradication Phase
Incident Response Framework Containment Phase
Incident Response Framework: Detection Phase
Incident Response Framework: Preparation Phase
Incident Response Framework