Home / Knowledge Base / Write-ups

Write-ups

In-depth articles and guides for comprehensive knowledge base understanding and application.

Try these 27 AI Write-ups Tools

Exposing Security Observability Gaps in AWS Native Security Tooling
Free

Exposing Security Observability Gaps in AWS Native Security Tooling

A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

APFS File System Format Reference Sheet
Free

APFS File System Format Reference Sheet

BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance for network monitoring and intrusion detection applications.

awesome-mobile-security
Free

awesome-mobile-security

A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

BPF+: Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture
Free

BPF+: Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture

Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

Cloudflare Learning Center
Free

Cloudflare Learning Center

A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.

Computer Security Incident Handling Guide
Free

Computer Security Incident Handling Guide

A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.

Crowdroid: Behavior-Based Malware Detection System for Android
Free

Crowdroid: Behavior-Based Malware Detection System for Android

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

Detecting the Elusive - Active Directory Threat Hunting
Free

Detecting the Elusive - Active Directory Threat Hunting

Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

Framework for Cybersecurity Info Sharing
Free

Framework for Cybersecurity Info Sharing

APFS is a proprietary file system developed by Apple for macOS, offering improved performance, security, and reliability.

Hardening OpenLDAP on Linux with AppArmor and systemd
Free

Hardening OpenLDAP on Linux with AppArmor and systemd

A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

Incident Response Flowchart
Free

Incident Response Flowchart

The Cloudflare Learning Center provides educational resources covering various cybersecurity and internet-related topics, including DDoS attacks, CDNs, DNS, web application security, serverless computing, encryption protocols, bots, cloud computing, Zero Trust security, SASE, networking, data privacy, video streaming, email security, and AI.

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
Free

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.

Intrusion Discovery Cheat Sheet v2.0
Free

Intrusion Discovery Cheat Sheet v2.0

A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.

John the Ripper Cheat Sheet
Free

John the Ripper Cheat Sheet

A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

Linux Detection Engineering -  A primer on persistence mechanisms
Free

Linux Detection Engineering - A primer on persistence mechanisms

A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

Nmap Cheat Sheet v1.0
Free

Nmap Cheat Sheet v1.0

A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.

OODA-driven SOC Strategy
Free

OODA-driven SOC Strategy

A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.

Pivoting Cheat Sheet
Free

Pivoting Cheat Sheet

Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

PowerShell Cheat Sheet v. 4.0
Free

PowerShell Cheat Sheet v. 4.0

A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.

Proxmark III
Free

Proxmark III

A quick reference guide for the VI editor, covering commands and modes.

SecTemplates
Free

SecTemplates

APFS is a proprietary file system developed by Apple for macOS, offering improved performance, security, and reliability.

SMB Access from Linux Cheat Sheet
Free

SMB Access from Linux Cheat Sheet

A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.

SP 800-82, Guide to Industrial Control Systems (ICS) Security
Free

SP 800-82, Guide to Industrial Control Systems (ICS) Security

A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.

SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs
Free

SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs

A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.