Sharing our knowledge
Knowledge center
FalconHound, attack path management for blue teams
[dsm_breadcrumbs show_home_icon="off" separator_icon="K||divi||400" admin_label="Supreme Breadcrumbs" _builder_version="4.18.0" _module_preset="default" items_font="||||||||" items_text_color="rgba(255,255,255,0.6)" custom_css_main_element="color:...
Microsoft Defender for Endpoint Internals 0x05 — Telemetry for sensitive actions
[dsm_breadcrumbs show_home_icon="off" separator_icon="K||divi||400" admin_label="Supreme Breadcrumbs" _builder_version="4.18.0" _module_preset="default" items_font="||||||||" items_text_color="rgba(255,255,255,0.6)" custom_css_main_element="color:...
FalconFriday — Evasive LOLBINs and burning the CACTUSTORCH — 0xFF04
The curious case of Realtek and LSASS
Why communication and management is crucial in red teaming exercises
FalconFriday — Process injection and malicious CPL files — 0xFF03
Sysmon 12.0 — EventID 24
FalconFriday — Detecting suspicious code compilation and Certutil — 0xFF02
Introducing: Falcon Friday
FalconFriday — Detecting Malicious Browser Extensions and code signing- 0xFF01
Using Azure Pipelines to validate my Sysmon configuration
Together. Secure. Today.
Stay in the loop and sign up to our newsletter
FalconForce realizes ambitions by working closely with its customers in a methodical manner, improving their security in the digital domain.
Energieweg 3
3542 DZ Utrecht
The Netherlands
FalconForce B.V.
[email protected]
(+31) 85 044 93 34
KVK 76682307
BTW NL860745314B01