Cheat Sheets

Compromise Assessment
Joseph McCray

Performing a Compromise Assessment with Velociraptor: Your Cybersecurity Lifeline

In today’s fast-paced cyber landscape, threats are not just possibilities—they’re realities. With cyberattacks becoming more sophisticated and frequent, organizations must be proactive in their defenses. A compromise assessment is your essential strategy for uncovering hidden risks, and when powered by Velociraptor, your cybersecurity capabilities can soar to new heights! Contents1

Read More »
Compromise Assessment
Joseph McCray

Performing a compromise assessment with Wazuh

In today’s digital landscape, conducting a thorough compromise assessment is essential for identifying vulnerabilities and enhancing your cybersecurity posture. Wazuh, an open-source security monitoring tool, provides powerful capabilities for this purpose. This guide will walk you through the steps of performing a compromise assessment using Wazuh, offering detailed insights, code

Read More »
Compromise Assessment
Joseph McCray

Performing a Compromise Assessment with ELK: An In-Depth Guide

In today’s digital landscape, organizations face an increasing number of cyber threats. Conducting a compromise assessment is vital to understanding vulnerabilities and safeguarding sensitive data. This guide will walk you through performing a comprehensive compromise assessment using the ELK stack (Elasticsearch, Logstash, and Kibana), offering in-depth insights and practical applications

Read More »
Compromise Assessment
Joseph McCray

Performing a Compromise Assessment with Osquery: The Ultimate Guide

Compromise assessments (CAs) are essential tools in today’s cybersecurity landscape, offering organizations the ability to detect and respond to security breaches early. Leveraging powerful open-source tools like Osquery can significantly improve this process, ensuring that systems remain secure while offering deep insights into suspicious activity. This guide delves into how

Read More »