#atomicredteam

2024-02-07

Intro to Threat Emulation - I have just completed this room! Check it out @RealTryHackMe:

💙Understand what Threat Emulation is.
💙Identify various frameworks used in Threat Emulation.
💙Understand how to plan, execute and report emulation exercises.

tryhackme.com/room/threatemula #tryhackme #security #blueteam #threatemulation #mitre #attacksimulation #adversaryemulation #atomicredteam

KillrBunn3 (LocalAreaKnitwork)KillrBunn3@defcon.social
2023-08-08

Thank you everyone for showing up to my talk! I really enjoyed seeing you guys. If you ever have questions for me about building a lab environment or working with Atomic Red Team, let me know and I'd be happy to help!

#atomicredteam #dianainitiative #DianaInitiative2023 #hackersummercamp

Tedi Heriyantotedi@infosec.exchange
2023-07-13

Red Canary's Coalmine is a system for automating the construction of virtual machines to test Red Canary’s detection engine, partner security products, and more: redcanary.com/blog/coalmine/

#detectionengineering #Atomicredteam

KillrBunn3 (LocalAreaKnitwork)KillrBunn3@defcon.social
2023-04-23

Just posted my slides from PancakesCon and DC207! If you want to build an Atomic testing range, this will help guide you.

killrbunn3.com/nuclear-testing

#atomicredteam #pancakescon #dc207 #testing #security #infosec

KillrBunn3 (LocalAreaKnitwork)KillrBunn3@defcon.social
2023-04-16

Hi Maine-based friends,

Just realized I didn't post about my talk! I'll be talking about attack emulation and building your own testing environment in Damariscotta on 4/20. Take a peek at dc207.org and look for the talk "Nuclear Testing" - that's me! Excited to see you all there, bring your questions!

#maine #dc207 #infosec #netsec #security #atomicredteam #attack

KillrBunn3 (LocalAreaKnitwork)KillrBunn3@defcon.social
2023-01-25

Okay. Choice time.

1. 6 month long sweater knitting project
2. Elden Ring
3. Start a new shawl with the yarn I picked up from DC
4. DFIR stuff with #atomicredteam
5. HTB
6. TryHackMe (which I haven't touched in a very long time)
7. Reading a #nostarchpress book

This right here is why I'm paralyzed by choices. Maybe if I make some coffee it'll be better.

2023-01-20

Windows Registry is one of the powerful features of Windows OS that being tweak and abused by Threat actors. In this Splunk Threat Research blog we described common MITRE ATT&CK TTP’s that leverages win registry ( 8/14) including its detections, #atomicredteam testing and analysis. 😊#splunk #malware #STRT#BlueTeam #detectionengineering

splunk.com/en_us/blog/security

Martin Boller :debian: :tux: :freebsd: :windows: :mastodon:itisiboller@infosec.exchange
2022-12-16

Happy to see awesome tools like MISP (17th), Wireshark, Atomic Read Team, OSQUERY and wazuh on this list: opensourcesecurityindex.io/

#MISP #AtomicRedTeam #Wazuh #Wireshark #Sigma #OSQUERY

2022-10-30

Feeling productive for a Sunday. Submitted MRs for T1547.015 LoginItems and T1040 Packet Capture using /dev/bpf to github.com/redcanaryco/atomic-

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst