<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 4:39 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberfibers.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyber Fibers</title>
		<link><![CDATA[https://cyberfibers.com]]></link>
		<description><![CDATA[Cyber Fibers]]></description>
		<lastBuildDate><![CDATA[Wed, 26 May 2021 21:23:30 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberfibers.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberfibers.com/2017/09/powershell-cheat-sheet/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/09/powershell-cheat-sheet/]]></link>
			<title>PowerShell Cheat Sheet</title>
			<pubDate><![CDATA[Wed, 26 May 2021 21:23:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/08/bluespectrum-an-ioc-framework-written-in-powershell/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/08/bluespectrum-an-ioc-framework-written-in-powershell/]]></link>
			<title>BlueSpectrum, an IOC framework written in PowerShell</title>
			<pubDate><![CDATA[Wed, 21 Dec 2016 23:58:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/09/find-malicious-versions-of-ccleaner/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/09/find-malicious-versions-of-ccleaner/]]></link>
			<title>Find Malicious Versions of CCleaner</title>
			<pubDate><![CDATA[Wed, 20 Sep 2017 11:19:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/go/utw-google/]]></guid>
			<link><![CDATA[https://cyberfibers.com/go/utw-google/]]></link>
			<title>UTW Google</title>
			<pubDate><![CDATA[Wed, 16 Dec 2015 03:01:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/go/utw/]]></guid>
			<link><![CDATA[https://cyberfibers.com/go/utw/]]></link>
			<title>UTW</title>
			<pubDate><![CDATA[Wed, 16 Dec 2015 03:00:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/go/skittles/]]></guid>
			<link><![CDATA[https://cyberfibers.com/go/skittles/]]></link>
			<title>skittles</title>
			<pubDate><![CDATA[Wed, 16 Dec 2015 02:57:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2021/08/teamviewer-forensic-artifacts/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2021/08/teamviewer-forensic-artifacts/]]></link>
			<title>Teamviewer Forensic Artifacts</title>
			<pubDate><![CDATA[Wed, 11 Aug 2021 10:52:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/go/presentations/]]></guid>
			<link><![CDATA[https://cyberfibers.com/go/presentations/]]></link>
			<title>Presentations</title>
			<pubDate><![CDATA[Tue, 30 Oct 2018 00:11:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2015/12/powershell-web-server-for-raw-text-transmission/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2015/12/powershell-web-server-for-raw-text-transmission/]]></link>
			<title>PowerShell Web Server for Raw Text Transmission</title>
			<pubDate><![CDATA[Tue, 15 Dec 2015 01:17:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/04/no-need-to-unzip-just-use-zcat-or-zgrep/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/04/no-need-to-unzip-just-use-zcat-or-zgrep/]]></link>
			<title>No Need to Unzip, Just Use Zcat or Zgrep</title>
			<pubDate><![CDATA[Tue, 12 Apr 2016 02:46:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2015/12/under-the-wire-v2/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2015/12/under-the-wire-v2/]]></link>
			<title>Under the Wire v2</title>
			<pubDate><![CDATA[Thu, 31 Dec 2015 04:25:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2021/02/970/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2021/02/970/]]></link>
			<title>SRUM DB&#8230; Enhancing Forensics!</title>
			<pubDate><![CDATA[Thu, 27 May 2021 00:09:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2020/03/reducing-smb-v3-vulnerability-attack-surface-2/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2020/03/reducing-smb-v3-vulnerability-attack-surface-2/]]></link>
			<title>Reducing SMBv3 Vulnerability Attack Surface</title>
			<pubDate><![CDATA[Thu, 27 May 2021 00:08:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/12/blocking-dns-tunneling-at-the-host/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/12/blocking-dns-tunneling-at-the-host/]]></link>
			<title>Blocking DNS Tunneling at the Host</title>
			<pubDate><![CDATA[Thu, 22 Dec 2016 12:29:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2019/07/finding-services-tied-to-processes/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2019/07/finding-services-tied-to-processes/]]></link>
			<title>Finding Services Tied to Processes</title>
			<pubDate><![CDATA[Thu, 14 Jan 2021 16:38:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2019/08/mitigating-bluekeep/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2019/08/mitigating-bluekeep/]]></link>
			<title>Reducing the Attack Surface for BlueKeep</title>
			<pubDate><![CDATA[Thu, 14 Jan 2021 16:36:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2019/09/parsing-iis/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2019/09/parsing-iis/]]></link>
			<title>Parsing IIS Logs</title>
			<pubDate><![CDATA[Thu, 14 Jan 2021 16:34:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2020/01/validating-the-presence-of-an-item-across-multiple-computers/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2020/01/validating-the-presence-of-an-item-across-multiple-computers/]]></link>
			<title>Validating the Presence of an Item across multiple computers</title>
			<pubDate><![CDATA[Thu, 14 Jan 2021 16:33:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/about_me/]]></guid>
			<link><![CDATA[https://cyberfibers.com/about_me/]]></link>
			<title>About Me</title>
			<pubDate><![CDATA[Thu, 14 Jan 2021 16:00:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/02/analyzing-memory-in-the-wonderful-world-of-redline/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/02/analyzing-memory-in-the-wonderful-world-of-redline/]]></link>
			<title>Analyzing Memory in the Wonderful World of Redline</title>
			<pubDate><![CDATA[Thu, 11 Feb 2016 02:10:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/05/parsing-registry-files-with-regripper/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/05/parsing-registry-files-with-regripper/]]></link>
			<title>Parsing Registry files with RegRipper</title>
			<pubDate><![CDATA[Thu, 05 May 2016 00:37:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2026/01/invoke-ghostlog-an-event-log-wiping-technique/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2026/01/invoke-ghostlog-an-event-log-wiping-technique/]]></link>
			<title>Invoke-Ghostlog: An Event Log Wiping Technique</title>
			<pubDate><![CDATA[Thu, 01 Jan 2026 16:15:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/12/553/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/12/553/]]></link>
			<title>Don&#8217;t Forget about Domain Trusts</title>
			<pubDate><![CDATA[Sun, 31 Dec 2017 03:09:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2015/11/detecting-alternate-data-streams-with-powershell-and-dos/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2015/11/detecting-alternate-data-streams-with-powershell-and-dos/]]></link>
			<title>Detecting Alternate Data Streams with PowerShell and DOS</title>
			<pubDate><![CDATA[Sun, 28 Jul 2019 02:33:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/01/427/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/01/427/]]></link>
			<title>Mass Import of McAfee Firewall Domains to block</title>
			<pubDate><![CDATA[Sun, 28 Jul 2019 02:33:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/11/hashes-of-all-running-processes/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/11/hashes-of-all-running-processes/]]></link>
			<title>Hashes of All Running Processes</title>
			<pubDate><![CDATA[Sun, 28 Jul 2019 02:33:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/12/hidden-gems-in-mcafee-epo-audit-logs/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/12/hidden-gems-in-mcafee-epo-audit-logs/]]></link>
			<title>Hidden Gems in McAfee ePO Audit Logs</title>
			<pubDate><![CDATA[Sun, 28 Jul 2019 02:33:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2018/11/677/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2018/11/677/]]></link>
			<title>Fileless Malware Storage: Registry &#8211; 1 of 4</title>
			<pubDate><![CDATA[Sun, 28 Jul 2019 02:32:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2019/01/fileless-malware-storage-2-of-4/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2019/01/fileless-malware-storage-2-of-4/]]></link>
			<title>Fileless Malware Storage: Active Directory– 2 of 4</title>
			<pubDate><![CDATA[Sun, 28 Jul 2019 02:32:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2019/04/713/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2019/04/713/]]></link>
			<title>Fileless Malware Storage: Event Logs– 3 of 4</title>
			<pubDate><![CDATA[Sun, 28 Jul 2019 02:32:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2019/05/fileless-malware-storage-group-policy-objects-4-of-4/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2019/05/fileless-malware-storage-group-policy-objects-4-of-4/]]></link>
			<title>Fileless Malware Storage: Group Policy Objects- 4 of 4</title>
			<pubDate><![CDATA[Sun, 28 Jul 2019 02:31:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2015/06/bare-monkey/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2015/06/bare-monkey/]]></link>
			<title>Bare Monkey (Volatility)</title>
			<pubDate><![CDATA[Sun, 21 Aug 2016 19:55:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2015/04/skittles-grinder-code/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2015/04/skittles-grinder-code/]]></link>
			<title>Skittle Grinder (Linux Log Collection)</title>
			<pubDate><![CDATA[Sun, 21 Aug 2016 19:49:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/08/under-the-wire/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/08/under-the-wire/]]></link>
			<title>Under The Wire!</title>
			<pubDate><![CDATA[Sun, 21 Aug 2016 19:17:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/presentations/]]></guid>
			<link><![CDATA[https://cyberfibers.com/presentations/]]></link>
			<title>Presentations and Publications</title>
			<pubDate><![CDATA[Sun, 21 Apr 2024 14:27:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/02/get-registry-hives-and-keys-remotely/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/02/get-registry-hives-and-keys-remotely/]]></link>
			<title>Get Registry Hives and Keys Remotely</title>
			<pubDate><![CDATA[Sun, 19 Feb 2017 19:24:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/02/finding-passwords-in-text-files-with-powershell/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/02/finding-passwords-in-text-files-with-powershell/]]></link>
			<title>Finding Passwords in Text Files with PowerShell</title>
			<pubDate><![CDATA[Sun, 05 Feb 2017 15:20:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2019/08/invoke-fail2ban/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2019/08/invoke-fail2ban/]]></link>
			<title>Invoke-Fail2Ban</title>
			<pubDate><![CDATA[Sun, 04 Aug 2019 02:47:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/04/analyzing-various-memory-capture-formats/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/04/analyzing-various-memory-capture-formats/]]></link>
			<title>Analyzing Various Memory Capture Formats</title>
			<pubDate><![CDATA[Sun, 03 Apr 2016 01:50:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2021/07/parsing-bitvise-logs-for-analysis/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2021/07/parsing-bitvise-logs-for-analysis/]]></link>
			<title>Parsing Bitvise Logs for Analysis</title>
			<pubDate><![CDATA[Sat, 17 Jul 2021 23:45:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/03/getting-hashes-with-microsofts-file-checksum-integrity-verifier-fciv/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/03/getting-hashes-with-microsofts-file-checksum-integrity-verifier-fciv/]]></link>
			<title>Getting hashes with Microsoft&#8217;s File Checksum Integrity Verifier (FCIV)</title>
			<pubDate><![CDATA[Sat, 04 Mar 2017 13:16:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/11/hunting-self-signed-certificates/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/11/hunting-self-signed-certificates/]]></link>
			<title>Hunting Self-signed Certificates</title>
			<pubDate><![CDATA[Sat, 02 Dec 2017 12:34:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/03/application-whitelisting-with-applocker/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/03/application-whitelisting-with-applocker/]]></link>
			<title>Application Whitelisting with Applocker</title>
			<pubDate><![CDATA[Mon, 28 Mar 2016 13:37:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/11/525/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/11/525/]]></link>
			<title>Finding Reflective DLL Injections</title>
			<pubDate><![CDATA[Mon, 27 Nov 2017 14:11:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/09/determining-winrm-connections-to-a-machine/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/09/determining-winrm-connections-to-a-machine/]]></link>
			<title>Determining WinRM connections to a Machine</title>
			<pubDate><![CDATA[Mon, 18 Sep 2017 15:38:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/01/sinkhole-domains-using-dns-with-the-help-of-powershell/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/01/sinkhole-domains-using-dns-with-the-help-of-powershell/]]></link>
			<title>Sinkhole Domains Using DNS with the help of PowerShell</title>
			<pubDate><![CDATA[Mon, 16 Jan 2017 13:15:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2016/01/another-layer-of-defense-microsoft-baseline-security-analyzer-mbsa/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2016/01/another-layer-of-defense-microsoft-baseline-security-analyzer-mbsa/]]></link>
			<title>Another Layer of Defense… Microsoft Baseline Security Analyzer (MBSA)</title>
			<pubDate><![CDATA[Fri, 20 Nov 2020 20:07:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2021/06/retrieving-files-youve-uploaded-to-microsoft-teams/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2021/06/retrieving-files-youve-uploaded-to-microsoft-teams/]]></link>
			<title>Retrieving Files You&#8217;ve Uploaded to Microsoft Teams</title>
			<pubDate><![CDATA[Fri, 11 Jun 2021 23:04:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2017/07/base64-with-powershell/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2017/07/base64-with-powershell/]]></link>
			<title>Base64 with PowerShell</title>
			<pubDate><![CDATA[Fri, 08 Sep 2017 14:03:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberfibers.com/2015/12/327/]]></guid>
			<link><![CDATA[https://cyberfibers.com/2015/12/327/]]></link>
			<title>PowerShell Web Server for File Transmission</title>
			<pubDate><![CDATA[Fri, 04 Dec 2015 02:11:04 +0000]]></pubDate>
		</item>
				</channel>
</rss>
