/categories Security Query and analyze Wazuh indexer data with Python (Bash|Grep)-Fu Log Analysis Log analysis with Pandas Archive Wazuh logs and alerts to s3 bucket SELinux Linux hardening with OpenSCAP Install Autopsy to Debian using Ansible Scanning for Indications of Compromise with Loki Wazuh - The Open Source Security Platform Advanced Intrusion Detection Environment (AIDE) and JSON Use Hashcat to get password of Veracrypt hidden volume Some random Windows things (Applocker, Volatility, etc.) Restrict USB usage with Group Policy Using Falco as Host Intrusion Detection System (HIDS) Tips for networks security assesments Training with DetectionLab Hardening Linux workstation with Ansible Apparmor basics Lock screen when USB device is not present or is removed (Linux) Binding LUKS encryption to TPM with Clevis Attacking LUKS full-disk encryption Securing Linux workstations Filtering Pfsense firewall logs with Graylog Manage domain-joined Windows machines with Ansible Centralized log collection and monitoring (part 2) Centralized log collection and monitoring Monitoring Windows login events with WMI Encrypting an external HDD with LUKS Nginx and client certificates Ansible Linux hardening with OpenSCAP Install Autopsy to Debian using Ansible Hardening Linux workstation with Ansible Manage domain-joined Windows machines with Ansible Debugging Ansible modules Homelab Monitoring Linux system with Grafana Replacing Rsnapshot with Duplicity Centralized log collection and monitoring (part 2) Centralized log collection and monitoring Monitoring Ruuvi tags with Raspberry Pi (part 2) Monitoring Ruuvi tags with Raspberry Pi Saving files from a (potentially) failing hard drive Windows Some random Windows things (Applocker, Volatility, etc.) Manage domain-joined Windows machines with Ansible Monitoring Windows login events with WMI iOS Investigating iPhone backups in Linux with libimobiledevice LogAnalysis Query and analyze Wazuh indexer data with Python (Bash|Grep)-Fu Log Analysis Log analysis with Pandas