NobisD
  • |
  • Fr
  • Articles
  • À propos
  • RSS
NobisD Logo

NobisD

Explore -

Latest posts

View all →
Using cybersecurity graphs for DFIR, detection and threat hunting
Why modeling logs, attack paths and investigation pivots as graphs can help defenders in DFIR, detection and threat hunting.
18/05/2026
Forensics at Scale: Using Dissect and ELK for Efficient Investigations
How to use Dissect and ELK to conduct large-scale forensic operations across multiple evidence files
06/04/2026
Active Directory DFIR investigation: analyzing a PCAP with Zeek, SMB, RDP and DPAPI
Full network investigation in an Active Directory environment. Detecting initial access, lateral movement, and more.
27/02/2026
© 2026 NobisD | DFIR, purple & labs · Powered by Hugo & PaperMod