Cybersecurity Resource Center

Predicting Malicious Network Connections Using Splunk and AI

See how Splunk can be used to predict malicious network connections using artificial intelligence and machine learning!

Splunk and AI, Part 2 – Threat Hunting on Domain Controllers Using Deep Learning

See how machine learning and artificial intelligence can be used within Splunk to find anomalies on domain controllers

Splunk and AI, Part 1- Automating Threat Hunting With Artificial Intelligence

See how artificial intelligence can be used within Splunk to bring possible security anomalies to light.

Malware Defense: Ransomware Protection with SentinelOne

With the rise of ransomware attacks, it’s important for small businesses to have some kind of defense against them.
Malware Defense: Ransomware Protection with SentinelOne

GhostPack: Windows Hacking with C#

Most people think of Metasploit, Powershell, and C++ when it comes to hacking Windows systems.

Brute Forcing With BurpSuite

BurpSuite is one of those de facto tools when it comes to web application hacking.
Brute Forcing With BurpSuite

Shellcode Execution with UUIDs

Executing shellcode on Windows is something that is very useful in the right situations.
Shellcode Execution with UUIDs

Network Hacking: The Importance of Encryption and HTTPS

Whether we’re aware of it or not, network security is an important part of our everyday lives.
Network Hacking: The Importance of Encryption and HTTPS

Cloud Hacking: AWS Exploitation with Pacu

Cloud computing has effectively taken over IT departments in general, with cloud security being at the forefront of most IT departments.
Cloud Hacking: AWS Exploitation with Pacu

Malware Debugging: C++ Reverse Shell

Let’s see a C++ reverse shell in action, using Visual Studio to debug it as it runs!
Malware Debugging: C++ Reverse Shell