
Cyber Defenders Labs
Red Stealer Lab — Threat Intelligence Walkthrough
In this lab, I’m stepping into the role of a Threat Intelligence analyst inside a SOC.
PsExec Hunt Lab Walkthrough
In this lab, we investigate a network compromise flagged by an Intrusion
The Crime Lab — ALEAPP Mobile Forensics Walkthrough
We’re investigating a murder where the victim’s Android phone was recovered.
Lespion Lab Walkthrough
Investigate an insider threat by analyzing GitHub repos for exposed credentials
Amadey Trojan Stealer — Memory Forensics
After an after-hours EDR alert flagged suspicious activity on a Windows workstation
Malware Hash Investigation Walkthrough
During a regular IT security check at GlobalTech Industries
LLMNR/NBT-NS Poisoning Investigation Report
Our security monitoring flagged a spike in suspicious name resolution traffic on the network.
WebStrike PCAP
A suspicious file was identified on a company web server, raising alarms within the intranet