#blue-team
7 posts
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
ToolsFebruary 9, 2026
Autopsy
Digital forensics analysis platform for disk image examination and evidence recovery
#forensics#dfir#blue-team
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
ToolsFebruary 9, 2026
RITA
Real Intelligence Threat Analytics framework for detecting C2 beacons and DNS tunneling
#blue-team#dfir#threat-hunting
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
ToolsFebruary 9, 2026
Suricata
Open-source IDS/IPS for network traffic analysis and threat detection using signatures
#blue-team#ids-ips#network-analysis
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
ToolsFebruary 9, 2026
tcpdump
Command-line packet analyzer for capturing and filtering network traffic
#networking#packet-capture#blue-team
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
ToolsFebruary 9, 2026
Velociraptor
Open-source DFIR platform for endpoint monitoring, collection, and threat hunting
#dfir#blue-team#threat-hunting
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
ToolsFebruary 9, 2026
Wireshark
Network protocol analyzer with GUI for deep inspection of packet captures
#networking#packet-capture#blue-team
> ./exploit.sh
[*] Scanning target...
[+] Vulnerability found
ToolsFebruary 9, 2026
Zeek
Network security monitor that converts packet captures into structured log files
#blue-team#network-analysis#dfir