Security Scriptographer

Through Security Scriptographer, I transform complex security concepts into practical scripts and tutorials. Proficient in Python, and various security frameworks, I'm here to help others enhance their security toolkit. Simple code, serious security. 🛡️

Pages - Menu

▼

MITRE ATT&CK to SIEM Rules: A Practical Look at SIOR-Helper

›
Hey there, fellow threat hunters! 👋 Today we're talking about something that caught my attention while browsing the endless wasteland o...

From Logs to Threats: SIEM Correlation Rules for Real Attacks

›
Hey there, fellow threat hunters! 👋 Today we're talking about something that separates the SIEM wizards from the alert-drowning masses:...

YARA Rules for Beginners: Teaching Your Computer to Spot Bad Guys

›
Hey there, fellow threat hunters! 👋 Today we're diving into YARA rules - because manually hunting through thousands of files for malwar...

Windows Security: Detecting malicious scheduled tasks

›
Hey there, fellow threat hunters! 👋 Today we're diving into the fascinating world of Windows Scheduled Tasks. While they're essenti...

Windows Security: Best practices for securing Windows services

›
Hey there, fellow threat hunters! 👋 Today we're diving into Windows Service hardening. Sure, everyone knows you should "secure you...
›
Home
View web version
Powered by Blogger.