Counting Connections With tshark

Sorting tshark’s Conversation (conv) Output

Running Your Security Team Like a Startup

How to Change the IP Addresses in a PCAP File

Port Forwarding With VirtualBox

Proper Safelisting When Threat Hunting

Why Threat Hunting should be a Security Standards Requirement

Threat Hunting Shorts – Collecting The Right Data – Video Blogs

Threat Hunting Shorts – External Target Investigation – Video Blogs

Detecting Beacons by System Name with RITA and AC-Hunter

Threat Hunting Shorts – Safelisting – Video Blog

Threat Hunting Shorts – C2 over DNS – Video Blog