🦹
CYBERSECURITY BOOK
search
⌘Ctrlk
🦹
CYBERSECURITY BOOK
  • 👽CS && PEN-TESTING BOOK
  • 🦹REAL WORLD && CTF
  • 🦸MISCELLANEOUS
  • 🧛‍♂️ADVANCED PERSISTENT THREATS - RESEARCH
  • 👾THREAT HUNTING - RESEARCH
    • appleMacOS
    • windowsAzure Sentinel
    • chart-networkNetwork Data
    • radiationActive Directory
    • binary-circle-checkData Collection
    • microchipData Management and Processing
      • nfcData Processing
      • standard-definitionCommon CTI Standards
      • jar-wheatStorage and Integration
      • layer-groupThreat Intelligence Platforms
    • chart-simpleAnalysis
    • house-flagCampaign Analysis
    • box-open-fullAttribution
    • shareDissemination and Sharing
  • 🦅CISA - INCIDENT RESPONSE PLAYBOOK
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 👾THREAT HUNTING - RESEARCH

microchipData Management and Processing

nfcData Processingchevron-rightstandard-definitionCommon CTI Standardschevron-rightjar-wheatStorage and Integrationchevron-rightlayer-groupThreat Intelligence Platformschevron-right
PreviousOSINTchevron-leftNextData Processingchevron-right