Menu

Tag Archives: Analysis

Ponemon Institute
Conducts independent research on privacy, data protection and information security policy. http://www.ponemon.org/?mobile=false
Snare
Tool for analyzing system event logs. https://www.intersectalliance.com/
CloudShark
Web based packet capture analysis. https://www.cloudshark.org/
Log Expert
Log analysis program for Windows logs. http://www.log-expert.de/
Volatility
Memory forensics tool. http://volatility-labs.blogspot.com/
Exploring Splunk
Guide for installing and using Splunk written by David Carasso, Splunk’s Chief Mind. http://www.splunk.com/goto/book
Splunk>
Monitor, analyze, and visualize log files and other data. http://www.splunk.com/
Cuckoo Sandbox
Sandbox for automated malware analysis. http://cuckoosandbox.org/
Sysinternals Suite
Debugging tools and utilities for the Windows operating system. https://technet.microsoft.com/en-us/sysinternals/bb842062.aspx
Practical Malware Analysis
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software