End-Point Security & Threat Hunting
Analysts Guide to Malware & Phishing
Are you looking to learn malware analysis and get a better paying job in the information security field? Are you unsure where to begin? The Analyst's Guide to Malware & Phishing analysis book is probably what you are looking for!
Linux IR Tools
Linux incident response scripts designed to quickly and, efficiently obtain critical information during an incident or event.
MacOS IR Tools
MacOS incident response and triage scripts to help you perform rapid Incident Response. These tools provide everything you would need in an enterprise environment boiled down on a pen-drive. Purchase once, updated for life!
SOC Consulting
Our SOC consulting services enhance your security by offering expert guidance on monitoring, detecting, and responding to security incidents. We specialize in Linux, macOS, and Windows systems, providing services such as incident response, threat hunting, endpoint forensics, and defense-in-depth strategies. Our team also offers SOC training, malware and phishing analysis, alert gap detection, ...
Windows Incident Response
Do you believe your Windows system or network has been compromised? We provide services to help you identify potential compromises and help clean them up!