389 Followers
55 Following
225 Posts

#DFIR #BlueTeam
Github: https://github.com/00010111
Not representing my employer (past & present).

tootfinder

Browser-based tool for parsing, analyzing, and triaging FortiGate firewall CSV log files. https://github.com/M4shl3/FORTIDFIR #DFIR
GitHub - M4shl3/FORTIDFIR

Contribute to M4shl3/FORTIDFIR development by creating an account on GitHub.

GitHub

As likely already posted by others, but still relevant to share regarding the npm package madness:

Potential hardening options for npm which can be configured global and on project level:

npm has an option to ignore scripts: ignore-scripts:
Quote from documentation: ‘not run any pre- or post-scripts’

npm (since cli version 11) has an option to set a minimum release age: min-release-age
Quote from documentation: ‘only versions that were available more than given number of days .. will be installed’

Full official documentation: https://docs.npmjs.com/cli/v11/using-npm/config

Note: I have not tested these options. And keep in mind actors will always adopt to measure taken by defenders.

#npm #DFIR

Config | npm Docs

About npm configuration

Debugging - WinDBG & WinDBGX Fundamentals by @corelanc0d3r.bsky.social
https://www.corelan.be/index.php/2026/03/23/debugging-windbg-windbgx-fundamentals/
Debugging - WinDBG & WinDBGX Fundamentals - Corelan | Exploit Development & Vulnerability Research

Learn how to leverage WinDBG & WinDBGX for effective debugging. Essential tutorial for exploit development and analysis.

Corelan | Exploit Development & Vulnerability Research

I created a blog post on the NVISO blog, to share some observations we made in a recent incident dealing with Ivanti Endpoint Manager (EPMM), CVE-2026-1281, CVE-2026-1340 and not so sleepy 'sleeper shells'.
https://blog.nviso.eu/2026/03/13/ivanti-epmm-sleeper-shells-not-so-sleepy/

#BlueTeam #IncidentResponse #SharingIsCaring

Exploitation of CVE-2026-1281 & CVE-2026-1340 Ivanti EPMM Sleeper Shells

Exploitation of CVE-2026-1281 & CVE-2026-1340 in Ivanti EPMM - ‘Sleeper Shells’ not so sleepy?

NVISO Labs

I’ve been discussing patch/vulnerability management more often than usual lately. Here’s some food for thought I shared:

Not only recent examples have shown how quickly attackers turn fresh patches into mass exploitation. They’re not waiting 1–2 weeks while we run through test → stage → prod. Even with good reasons to test first, that timeline can be too slow for certain vulnerabilities.
We still need testing - and let’s be honest, the organization isn’t idle or excited about the next change to test - so the process won’t speed up.

The scope of patch/vulnerability management processes needs to expand: It doesn’t end when the patch is successfully applied. It needs to assess for each vulnerability:
 - Is this a trivial remote code execution on an network-edge device?
 - Or a niche, complex bug on an isolated system?

If it looks like the first case, plan for a compromise assessment alongside the patch rollout. Assume attackers may have moved faster than your change window.

And because reality often doesn’t give us perfect intel on day one, include structured follow-up, for example track emerging IOCs, exploit details, and vendor/community guidance post-release. This can tell you what to look for as signs of compromise or exploitation.

Bottom line: Let’s make the decision - whether and how deep to run a compromise assessment, plus the follow-up a formal part of patch/vulnerability management, and adapt the process where needed. For sure it won’t be easy, and it won’t fit every vuln on every asset. But the alternative might be a fully patched, yet compromised device that a simple check might have caught.

#PatchManagement #VulnerabilityManagement

"Linux Notes: ls and Timestamps"
Some nice hints in there to ease usage of ls.
#linux
https://righteousit.com/2026/03/06/linux-notes-ls-and-timestamps/
Linux Notes: ls and Timestamps

Confused about timestamp options and output with the Linux ls command? Here are some of my favorite tips!

Righteous IT
#stayinvictus #cloudincidentresponse #google #gws | Invictus Incident Response

We have had some questions asked around our Google Cloud/Workspace IR training and excited to share with you that we're making good progress. Keep following this page for updates and the official release date! In the meantime a 'little' overview of Google Workspace Audit logging. Let us know in the comments which log is in your Top 3 for Incident Response #stayInvictus #CloudIncidentResponse #Google #GWS

"Trust Me, I’m a Shortcut", nice blog about windows .LNK files. https://www.wietzebeukema.nl/blog/trust-me-im-a-shortcut #DFIR #Blueteam
Trust Me, I’m a Shortcut

Windows’ primary mechanism for shortcuts, LNK files, is frequently abused by threat actors for payload delivery and persistence. This blog post introduces several new LNK file flaws that, amongst other things, allow attackers to fully spoof an LNK’s target. It also introduces lnk-it-up, a tool suite that can generate such deceptive LNK files, as well as detect anomalous ones.

A community database, API and collaboration platform to help identify and protect against open-source malware -> https://opensourcemalware.com/ #DFIR #blueteam
OpenSourceMalware.com - Community Threat Intelligence

Security professionals sharing intelligence on malicious packages, repositories, and CDNs to protect the open source ecosystem.

https://samplepedia.cc/
New, free resource for malware samples to experiment and train.
#dfir
Welcome to Samplepedia