community.emergingthreats.net/c/tutorials-...
Look for the stuff posted by trobinson667. Tons of great advice for threat hunting, intelligence gathering, and rule writing. Cheers!
community.emergingthreats.net/c/tutorials-...
Look for the stuff posted by trobinson667. Tons of great advice for threat hunting, intelligence gathering, and rule writing. Cheers!
leanpub.com/u/da_667
My books are always "pay what you want", even if that means not paying at all.
leanpub.com/u/da_667
My books are always "pay what you want", even if that means not paying at all.
community.emergingthreats.net/t/detection-...
Enjoy your Saturday
community.emergingthreats.net/t/detection-...
Enjoy your Saturday
Until then, enjoy the weekend, fuck Cisco, stomp out the fascism before it takes root, and one love. later
Until then, enjoy the weekend, fuck Cisco, stomp out the fascism before it takes root, and one love. later
-An identical break-down for Snort that shows how we achieve feature parity between two vastly different IDS engines.
www.totes-legit-notmalware.site/home/detecti...
happy hunting
-An identical break-down for Snort that shows how we achieve feature parity between two vastly different IDS engines.
www.totes-legit-notmalware.site/home/detecti...
happy hunting
-How to properly archive proof of concept code so that the code isn't deleted on a whim and lost forever
-The handful of vulns I wrote rules for themselves
-How to properly archive proof of concept code so that the code isn't deleted on a whim and lost forever
-The handful of vulns I wrote rules for themselves