#tools
#DFIR
#Blue_Team_Techniques
1.
ACEshark - Extract and analyze Windows service configurations and Access Control Entries
2.
RequestShield - Analyze HTTP access.logs to identify potential security threats
3.
WhacAMole - Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and environment variables