Pwntario Team Blog
  • Home
  • Team Posts
    • Anton's Posts
      • Hunt Fast: Splunk and tstats
      • Hunting Malicious Macros
      • Get Azure Key Vault Data into Splunk
      • Edit Your Sysmon Config in Style
      • Wrangle Your PowerShell Transcript Logs with Apache Nifi
      • (Very) Basic Elastic SIEM Set up
      • Moloch + Suricata + JA3
      • Making Lateral Movement Difficult in an Active Directory Environment
      • Taking a Closer Look at PowerShell Download Cradles
      • Visualize Windows Logs With Neo4j
      • Device Guard - Fixing VMWare Tools
      • Offensive Security OSCE (CTP) Review
      • (Attempting) to Detect Responder with Sysmon
      • Working with Sysmon
      • Setting Up Sysmon
    • Lee's Posts
      • Malicious AzureAD Application Registrations
  • Members
    • @ShellStorm
    • @seeonedave
    • @ZupOctopus
    • @Antonlovesdnb
    • @InvokeThreatGuy
Powered by GitBook
On this page

Was this helpful?

  1. Team Posts

Anton's Posts

Hunt Fast: Splunk and tstatsHunting Malicious MacrosGet Azure Key Vault Data into SplunkEdit Your Sysmon Config in StyleWrangle Your PowerShell Transcript Logs with Apache Nifi(Very) Basic Elastic SIEM Set upMoloch + Suricata + JA3Making Lateral Movement Difficult in an Active Directory EnvironmentTaking a Closer Look at PowerShell Download CradlesVisualize Windows Logs With Neo4jDevice Guard - Fixing VMWare ToolsOffensive Security OSCE (CTP) Review(Attempting) to Detect Responder with SysmonWorking with SysmonSetting Up Sysmon
PreviousTeam PostsNextHunt Fast: Splunk and tstats

Last updated 4 years ago

Was this helpful?