b00010111's Avatar

b00010111

@b00010111

DFIR BlueTeam Github: https://github.com/00010111 Not representing my employer (past & present).

51
Followers
16
Following
39
Posts
15.11.2024
Joined
Posts Following

Latest posts by b00010111 @b00010111

Preview
Linux Notes: ls and Timestamps – Righteous IT Confused about timestamp options and output with the Linux ls command? Here are some of my favorite tips!

"Linux Notes: ls and Timestamps"
Some nice hints in there to ease usage of ls.
#linux
righteousit.com/2026/03/06/l...

06.03.2026 18:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
#stayinvictus #cloudincidentresponse #google #gws | Invictus Incident Response We have had some questions asked around our Google Cloud/Workspace IR training and excited to share with you that we're making good progress. Keep following this page for updates and the official release date! In the meantime a 'little' overview of Google Workspace Audit logging. Let us know in the comments which log is in your Top 3 for Incident Response #stayInvictus #CloudIncidentResponse #Google #GWS

Overview on Google workspace audit logs by invictus IR: www.linkedin.com/posts/invict...
#DFIR #Blueteam

19.02.2026 06:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Trust Me, I’m a Shortcut Windows’ primary mechanism for shortcuts, LNK files, is frequently abused by threat actors for payload delivery and persistence. This blog post introduces several new LNK file flaws that, amongst other things, allow attackers to fully spoof an LNK’s target. It also introduces lnk-it-up, a tool suite that can generate such deceptive LNK files, as well as detect anomalous ones.

"Trust Me, I’m a Shortcut", nice blog about windows .LNK files. www.wietzebeukema.nl/blog/trust-m... #DFIR #Blueteam

17.02.2026 06:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
OpenSourceMalware.com - Community Threat Intelligence Security professionals sharing intelligence on malicious packages, repositories, and CDNs to protect the open source ecosystem.

A community database, API and collaboration platform to help identify and protect against open-source malware -> opensourcemalware.com #DFIR #blueteam

10.02.2026 21:09 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Welcome to Samplepedia

samplepedia.cc
New, free resource for malware samples to experiment and train.
#dfir

06.01.2026 21:19 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Strange, I cannot create a post in bluesky which contains a URL via @openvibe@mastodon.social . Not sure what is causing this.

18.12.2025 19:25 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Test to check if bluesky is still working

18.12.2025 18:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Notion A tool that connects everyday work into one space. It gives you and your teams AI toolsβ€”search, writing, note-takingβ€”inside an all-in-one, flexible workspace.

An ESXi IR guide, probably worth a read: mikecybersec.notion.site/ESXi-IR-Guid... #DFIR #Blueteam

23.11.2025 09:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Adaptive Collections in Velociraptor :: Velociraptor - Digging deeper! Velociraptor Adaptive Collections

Adaptive Collections in Velociraptor:

docs.velociraptor.app/blog/2025/20... #DFIR

07.10.2025 10:27 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Exploring Data Extraction from iOS Devices: What Data You Can Access and How DFIR research

blog.digital-forensics.it/2025/09/expl...

01.10.2025 15:22 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - olafhartong/BamboozlEDR: A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes. A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes. - olafhartong/BamboozlEDR

"A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes" #dfir # eventlogs
github.com/olafhartong/...

07.08.2025 08:34 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
I wrote up a quick article on the Medusa stealth rootkit on Linux and how to work around and investigate this style of LD_PRELOAD rootkit. | Craig Rowland I wrote up a quick article on the Medusa stealth rootkit on Linux and how to work around and investigate this style of LD_PRELOAD rootkit.

Medusa stealth rootkit on Linux and how to work around and investigate this style of LD_PRELOAD rootkit: www.linkedin.com/posts/craigh... #dfir #linux

29.07.2025 09:29 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
signature-base/yara/expl_sharepoint_jul25.yar at master Β· Neo23x0/signature-base Β· GitHub YARA signature and IOC database for my scanners and tools - Neo23x0/signature-base

github.com/Neo23x0/sign...
#CVE-2025-53770

21.07.2025 08:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Hiding Payloads in Linux Extended File Attributes
isc.sans.edu/diary/Hiding...
#DFIR #linux

18.07.2025 05:38 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

shodan@mastodon.shodan.io: "Check out our new Data Status page for an overview of what Shodan crawlers have collected the past day: data-status.shodan.io "

I still in the process to decide which stats do frighten me the most.....

11.07.2025 09:58 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Release v2025.05.30 Β· Beercow/OneDriveExplorer Β· GitHub Change Log Fixed ODL bug fix FileUsageSynce bug fix

Something you may not know. OneDriveExplorer also works for the OneDrive sync client for macOS.

github.com/Beercow/OneD...

25.06.2025 00:04 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - ekky19/Yara-Standalone-Webshell-Scanner: YARA Standalone WSS is an offline webshell scanning tool that uses YARA rules to detect malicious or suspicious files in webroot directories. No installation required β€” just drop your files, run the scanner, and review the generated HTML and TXT reports. YARA Standalone WSS is an offline webshell scanning tool that uses YARA rules to detect malicious or suspicious files in webroot directories. No installation required β€” just drop your files, run th...

Offline webshell scanning tool, based on YARA rules github.com/ekky19/Yara-... #DFIR #yara #webshell

22.06.2025 18:16 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Windows Registry Forensics Cheat Sheet 2025 - Cyber Triage Save. This. Post. Our expert staff has compiled an up-to-date and comprehensive Windows Registry forensics cheat sheet, and it might be just what you need

Windows Registry Forensics Cheat Sheet 2025 by Cyber Triage. Potentially worth a look to check your docu against it. www.cybertriage.com/blog/windows... #DFIR #Registry

04.06.2025 06:38 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
tools/qelp-ir-triage-esxi at master Β· cudeso/tools Β· GitHub Different tools, koen.vanimpe@cudeso.be . Contribute to cudeso/tools development by creating an account on GitHub.

Tool for triage & analysis of ESXi logs:
- Combined timeline of Bash activity, logons and user activity
- Timeline of logon events by type, along with a user/IP logon timeline
- Summary of Bash history, network-tool usage and newly created users

github.com/cudeso/tools... #DFIR #Logs #esxi

03.06.2025 07:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
iOS Unified Logs: The Myth of 30 Days Retention In this article, I explain how to use the log stats command to quickly learn more about a .logarchive and the unified logs it contains. I show how to read the main statistics using the command log stats, what TTL (Time To Live) really means, and why it’s so important for digital forensics. I also highlight a few inconsistencies in how Apple presents these statistics, and how to work around them.

"iOS Unified Logs: The Myth of 30 Days Retention - Analysis of TTLs and log stats Command" ->
www.ios-unifiedlogs.com/post/ios-uni... #DFIR #iOS #logs

06.05.2025 19:15 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Scouting a Threat Actor

Censys on C2 server called the β€œSCOUT PROJECT,” censys.com/blog/scoutin... #DFIR

02.05.2025 10:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The Impact of Microsoft’s ReFS on DFIR | by Mat Cyb3rF0x Fuchs | Apr, 2025 | Medium A New File System, New Forensic Challenges

"The Impact of Microsoft’s ReFS on DFIR" -> comparing NTFS evidences with ReFS. What stays, what changes and what will be gone. Recommended read! medium.com/@mathias.fuc... #DFIR #ReFS #NTFS #FileSystems

23.04.2025 20:44 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Check Point Research Research by: hasherezade Key Points Introduction Process injection is one of theΒ important techniques used by attackers. We can find its variants implemented in almost every malware. It serves purpose...

My new blog for CPR: introducing Waiting Thread Hijacking - a remote process injection technique targeting waiting threads: research.checkpoint.com/2025/waiting... #ProcessInjection

14.04.2025 18:17 πŸ‘ 15 πŸ” 10 πŸ’¬ 3 πŸ“Œ 0
Preview
Daily Blog #805: Mount That Thing! | Hacking Exposed Computer Forensics Blog A hacking exposed blog about computer and digital forensics and techniques, exposed dfir incident response file systems journaling by David Cowen

Sounds very handy:
"Mounting disk images (E01 or raw)
Handling LVM volumes
Automatically identifying and mounting partitions
...
All mount operations are performed read-only, with noexec and other conservative options to preserve evidence integrity."

www.hecfblog.com/2025/04/dail... #DFIR #Linux

12.04.2025 12:14 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Next noteworthy #breach incoming? Reading some chatter that there are claims of #checkpoint being breached by #coreinjection .
#dfir #threatintel

31.03.2025 08:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The 2024 Volatility Plugin Contest results are in! Results from the 12th Annual Volatility Plugin Contest are in! We received 6 submissions, from 6 different countries,Β that included 7 plugins, a Linux profile generation tool, and 9 supporti…

We are excited to announce that the @volatilityfoundation.org #PluginContest First Place winner is:

Valentin Obst for btf2json

Read the full Contest Results:
volatilityfoundation.org/the-2024-vol...

Congrats to all winners & thank you to all participants!
#DFIR #memoryforensics

28.03.2025 13:54 πŸ‘ 4 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0
Hunting-Queries-Detection-Rules/Entra ID/DetectSuspiciousFociTokenLogins.md at main Β· HybridBrothers/Hunting-Queries-Detection-Rules Β· GitHub The purpose of this repository is to share KQL queries to help identify security misconfigurations, hunt for specific patterns, or detect malicious behavior - HybridBrothers/Hunting-Queries-Detecti...

Detect suspicious foci token logins:
The in cluded description includes an explanation what foci tokens are and why a hunt might be useful. Nice work!

https://github.com/HybridBrothers/Hunting-Queries-Detection-Rules/blob/main/Entra%20ID/DetectSuspiciousFociTokenLogins.md
#DFIR #BlueTeam #KQL

28.03.2025 05:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Detecting Bincrypter Linux Malware Obfuscation A new Linux script from THC will encrypt and obfuscate any executable or script to hide from on-disk detection. It then launches the code in a way to not leave traces on the disk as a fileless attack.

Detecting Bincrypter Linux Malware Obfuscation
https://www.linkedin.com/pulse/detecting-bincrypter-linux-malware-obfuscation-craig-rowland-dzewc #DFIR #Linux #BlueTeam

27.03.2025 06:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
MALoney (It's in the name): OneDrive Microsoft.FileUsageSync.db I recently started to look into the Microsoft.FileUsageSync.db . The database can be found in %localappdat...

I started exploring OneDrive’s FileUsageSync.bd. There is some useful information on files shared via email, Teams, etc… that may not be in the user’s OneDrive.

https://malwaremaloney.blogspot.com/2025/02/onedrive-microsoftfileusagesyncdb.html

21.02.2025 17:53 πŸ‘ 0 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

I just came across email information in one of the OneDrive databases. Sender, recipients, subject, mailbox, attachments, etc…
Pretty much everything except the body. More to come. πŸ€” #DFIR

19.02.2025 04:13 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0