MrXcrypt
Search
Search
Dark mode
Light mode
Explorer
Active Directory
AD methodology
Android
Emulator
Start of Debugging
ArcX - CTI
0 Introduction
1 Intro to Threat Actors
2 Threat Vectors
3 Threat Intelligence Cycle
4 Law & Ethics
Bug Bounty
Method
Wordlists
CTF
vsCTF
intro-rev
CVE Exploits
Heartbleed Vulnerability - CVE 2014-0160
DFE codered
0 DFE codered
1 Computer Forensics Fundamental
2 Computer Forensic Investigation Process
3 Understanding Hard Disks & File Systems
4 Data Acquisition & Duplication
5 Defeating Anti-forensics technique
6 Windows Forensics
Email Security
DMARC Record
Enumeration
Nmap Scripts
General Cyber
Cyberlaw
Cybersecurity 101 - Specializations & Job Roles
Incident Response Plan
OWASP Top 10 2021
HackTheBox Writeups
PermX Walkthrough - HackTheBox
Sea Walkthrough - HackTheBox
Sightless Walkthrough - HackTheBox
Strutted Walkthrough - HackTheBox
Machine Hacking
Linux
OSCP
OSCP strategy
OSINT
0 Open Source Intelligence
1 Basic OSINT
2 Workflow of OSINT
3 Sock Puppets OSINT
4 Tools for OSINT
Portswigger Writeups
SSRF Portswigger labs 1
SSRF Portswigger labs 2
SOC level 1
0 Cyber Defence Frameworks
0 Junior Security Analyst intro
0 The Career
1 SOC
1 Pyramid of Pain
0 What is Pyramid of Pain
1 Hash Values (Trivial)
2 IP Address (Easy)
3 Domain Names (Simple)
4 Host Artifacts (Annoying)
5 Tools (Challenging)
6 TTPs (Tough)
2 Cyber Kill Chain
0 Intro & Kill Chain
1 Reconnaissance
2 Weaponization
3 Delivery
4 Exploitation
5 Installation
6 Command & Control
7 Action on Objectives
3 Unified Kill Chain
0 Intro & Threat Modelling
1 Phase In
2 Phase Through
3 Phase Out
4 Diamond Model
0 The Diamond Model
1 Meta Features
2 Components
5 MITRE
0 Intro to MITRE
1 ATT&CK Framework
2 CAR Knowledge Base
3 MITRE Engage
4 MITRE Defend
5 Att&ck Emulation Plans
1 Cyber Threat Intelligence
0 Intro to Cyber Threat Intel
0 Intro to CTI
1 CTI Lifecycle
2 CTI Standards & Frameworks
1 Threat Intelligence Tools
0 urlscan.io
1 abuse.ch
2 PhishTool
2 Yara
0 Intro to YARA
1. Expanding on YARA Rules
2. YARA Tools
3. LOKI & YARA rule set
4. yarGen
5 Valhalla
3 OpenCTI
0 OpenCTI & Data Model
1 OpenCTI Dashboard
4 MISP
0 MISP Intro & features
1 Event Management
2 Feeds & Taxonomies
2 Network Security and Traffic Analysis
0 Traffic Analysis
0 Network Security & Network Data
1 Traffic Analysis
1 Snort
0 Snort & IDS-IPS
1. Operation Modes
2 Snort Rule Structure
3 Points to Remember
3 Endpoint Security Monitoring
0 Intro to Endpoint security
0 Endpoint Security Fundamentals
2 Endpoint Logging & Monitoring
3 Event Log Analysis
1 Wazuh
0 Intro to wazuh
4 Security Information and Event Management
0 Intro to SIEM
0 Network Visibility through SIEM
1 Log Sources & Log ingestion
2 Analysis Logs & Alerts
Web Security
Captcha Bypass
Tabnabbing
Web Hacking
Home
❯
tags
❯
Tag: -cmdtool
Tag: -cmdtool
1 item with this tag.
Feb 28, 2025
6 Windows Forensics
-cmdtool
date
psloggedon
net
logonsessions
nbtstat
netstat
tasklist
PsList
ipconfig
dir