🔎
CyberSleuth Chronicles
ArchiveAbout UsResources
  • Welcome
  • 👋About Us
  • 📖Archive
  • 🔍The Unicorn, the OG, and the Academy
  • 🔓Open-Source Certified (OSC): Shaping the Future of OSINT Through Certification
  • 🔎Practical Junior OSINT Researcher (PJOR) : A Practical Review for a Practical Cert
  • 🕰️OSINT Week 2024
  • 🕰️OSINT Week CTF (May 2024)
  • 🕰️OSINT Week Answer Key
  • 🐻Analyzing APT 29 (NOBELIUM aka Cozy-Bear) – Part 1
  • 🐻Analyzing APT 29 (NOBELIUM aka Cozy-Bear) – Part 2
  • 👷Securing the Inbox
  • 🐦Serving up AD Decoy accounts to Responder
  • 📚Building a Detection Engineering Home-lab
  • 👷‍♂️Social Engineering TTPs Episode 2: Malicious Job Advertisements
  • 👷‍♂️Social Engineering TTPs Episode 1: Smishing with 2FA Spoofing
  • 📞Informational Interviews
  • 💾Resources
    • ☕Useful Resource for Everyone!
    • 👾Malware and Reverse Engineering Resources
Powered by GitBook