View Code? Open in Web Editor
NEW
Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host
License: Creative Commons Zero v1.0 Universal
power-forensics's Introduction
โ InfoSec Prefessional working on Blue side.
๐ญ Iโm currently working on DFIR on Cloud
๐ฑ Iโm currently learning DevSecOps
๐ฌ Ask me anything about DFIR
๐ช My Keys (A few in my arsenal)
Defensive security. Incident Response. Threat Hunt. Forensic investigation
Azure IDP/Azure ATP/TrapX/Dark-Trace, Cloud Proxy- Zscaler, McAfee ePO in terms of log analysis and managing the admin activities, AI driven Antimalware tool- Cylance(EPP & EDR).
Cloud- AWS, Prisma Cloud
SIEM Tools: IBM Qradar, Sumologic, Splunk, ELK
SOAR: Cortex XSOAR, Tines, Shuffle, Splunk Phantom
Forensic Tools: Volatility, Autopsy, MagnetRAM, FTK, Winpmem, PesStudio, hURL, Exiftool, Hashdeep, WOLF
EPP, EDR Tools: McAfee ePO, TrendMicro, Cylance, Symantec, Cortex XDR, Crowdstrike Falcon
Security Assessment Tools: Azure ATP & IDP, DarkTrace, TrapX, Qualys, Wireshark, Zenmap
DLP: SkyHigh
Proxy: Zscaler, Bluecoat, Websense
Perimeter Devices: Checkpoint UTM, Palo-Alto, Meraki, Fortinate, McAfee IDPS
Ticketing Tools: Resilient, BMC Remedy, ServiceNow
Operating System: Windows, Kali Linux, Linux- RedHat, Linux- Ubuntu
Scripting Language: C, Java, Php, JavaScript, JQuery, HTML5, Bash, VB, RegEx
๐ Badges(A few in my arsenal):
power-forensics's People
Contributors
Watchers