by Efrain Ortiz
Malware ID Decision Tree Basic malware investigation steps. |
Creating a receive only Ethernet cable for use with an IDS or sniffer. |
Creating a Loopback ethernet cable. |
OpenC2 command generation tool. |