Tools I Use
A curated collection of cybersecurity tools I rely on for malware analysis, digital forensics, and red team operations. Hover over any tool to learn more about how I use it in real-world scenarios.
Malware Analysis
3 tools🐧
REMnux
A Linux toolkit for reverse-engineering and analyzing malicious software. It's a curated collection of tools for malware analysis in a single VM.
🔥
FlareVM
A Windows-based security distribution designed for malware analysis, incident response, and reverse engineering on Windows platforms.
🔍
IDA Free
Industry-standard disassembler and debugger for reverse engineering binary files. The free version supports 64-bit analysis with some limitations.
Forensics
4 tools⚖️
AXIOM
Comprehensive digital forensics platform that processes and analyzes data from computers, mobile devices, and cloud services.
🔬
Autopsy
Open-source digital forensics platform with a graphical interface for analyzing hard drives and mobile devices.
📦
KAPE
Kroll Artifact Parser and Extractor - efficiently collects and processes forensic artifacts from Windows systems.
☁️
Binalyze
Cloud-based digital forensics platform offering remote evidence collection and analysis capabilities.
Red Teaming
3 tools🎯
Cobalt Strike
Advanced threat emulation software that provides post-exploitation capabilities and simulates sophisticated adversary tactics.
🐧
LinPEAS
Linux Privilege Escalation Awesome Script - automated tool for discovering privilege escalation vectors on Linux systems.
🩸
BloodHound
Graph-based tool for analyzing Active Directory security, identifying attack paths and privilege escalation opportunities.
Want to Learn More?
These tools are just the beginning. I regularly write detailed guides and case studies about using these tools in real-world scenarios.