Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Author: fl0x2208

Just a common human being - want to share my knowledge and experience
  • Home
  • fl0x2208
  • Page 4
OSINT Threat Intelligence

CIF – cleanmx threat feeds

June 3, 2016April 23, 2022

Good Day today indeed. Have finally got some time to work on my skills for CIF and writing configuration (YAML scripts) to fetch open source

Read More
General Tips Threat Intelligence

CIF – Collective Intelligence Framework – My deployment

June 1, 2016April 23, 2022

Morning Everybody!!!! Been working on crafting my skills in Threat Intelligence and available open source system. As the title says I have been working on

Read More
General Tips Malware Analysis

Malware Analysis – Mind Map

May 30, 2016April 23, 2022

Its been long time have updated my blog. Just busy @work and with family and trying to juggle a lot. Have been working a mind

Read More
Malware Analysis

Dridex malware dropper -New doc 115.doc

March 1, 2016April 23, 2022

On a pleasant morning I received an email with an doc attachment. The email was not having any text or message. Subject was name of

Read More
Fraud & Fin Crime Phishing

Ho Ho Ho – Here comes the spam/phish

January 17, 2016April 23, 2022

Merry Christmas and Happy New Year to all ! I thought to start the new year with a blog with regards to spam from Australian

Read More
Exploitation Vulnerability assessment

Heap Spray attempts : Compromised site http://www.efendim.net

December 20, 2015April 23, 2022

On a Saturday evening I spent some time in upgrading my MacBook Pro with an SSD. The only SSD I had was having security Onion

Read More
Information Gathering OSINT

Information Gathering – Then, Now and Why ?

November 28, 2015April 23, 2022

Information gathering is considered first and most important part before launching any types of attacks, hacking or penetration testing. Information gathering is known by several

Read More
General Tips

Installing/running TOR on Linux distros

November 14, 2015April 23, 2022

TOR – The onion routing – famous for anonymity. TOR browser gives user an edge to be anonymous while browsing. Installing TOR on windows box

Read More
Phishing

A interesting email – FROM field empty

November 6, 2015April 23, 2022

Received a interesting email yesterday from Mr. Gordon Hills from London who wanted me to be partner and 5 Million dollars will be released to

Read More
General Tips Information Gathering

Comand line use to check IP reputation

November 6, 2015April 23, 2022

Looking for reputation of an IP address is one of the most frequent task of an SOC analyst. There are number of online tools and

Read More

Posts navigation

Previous 1 … 3 4 5 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...