Rapid Cyber Incident Response
Run the Incident.
Don’t Let It Run You.
Hexastrike turns frontline experience into streamlined playbooks, tools, and courses that help your team investigate, contain, and eradicate threats before they gain traction. By stripping away guesswork and surfacing only the critical signals, we let you shut down breaches fast and keep the business on track.
Resources
In a previous post, we have shown how Velociraptor and CrowdStrike can work together to speed up the deep‑dive phase of an investigation. One...
At the beginning of the year, we investigated a cluster of Ivanti Connect Secure gateways that attackers had breached via CVE-2025-0282. If you missed...
To me, getting into COM was not as trivial as I thought. The first time I encountered COM was many years ago, when I...
Although CrowdStrike is a powerful EDR, incidents still happen, even when using thorough prevention policies. In this post, we will use CrowdStrike Falcon in...
Last September, I received an email about a supposed security issue in one of my GitHub repositories. The sender claimed they had discovered vulnerabilities...
Recently, I was reading A Bug Hunter’s Diary by Tobias Klein, an incredibly well-written book on various exploitation techniques and, more importantly, bug-hunting methodologies—particularly...