Cybersecurity Resource Center
Predicting Malicious Network Connections Using Splunk and AI
See how Splunk can be used to predict malicious network connections using artificial intelligence and machine learning!
Splunk and AI, Part 2 – Threat Hunting on Domain Controllers Using Deep Learning
See how machine learning and artificial intelligence can be used within Splunk to find anomalies on domain controllers
Splunk and AI, Part 1- Automating Threat Hunting With Artificial Intelligence
See how artificial intelligence can be used within Splunk to bring possible security anomalies to light.
Malware Defense: Ransomware Protection with SentinelOne
With the rise of ransomware attacks, it’s important for small businesses to have some kind of defense against them.
GhostPack: Windows Hacking with C#
Most people think of Metasploit, Powershell, and C++ when it comes to hacking Windows systems.
Brute Forcing With BurpSuite
BurpSuite is one of those de facto tools when it comes to web application hacking.
Shellcode Execution with UUIDs
Executing shellcode on Windows is something that is very useful in the right situations.
Network Hacking: The Importance of Encryption and HTTPS
Whether we’re aware of it or not, network security is an important part of our everyday lives.
Cloud Hacking: AWS Exploitation with Pacu
Cloud computing has effectively taken over IT departments in general, with cloud security being at the forefront of most IT departments.
Malware Debugging: C++ Reverse Shell
Let’s see a C++ reverse shell in action, using Visual Studio to debug it as it runs!