Thor APT Scanner. This report presents a technical… | by Cybercure | Medium
THOR Manual | PDF | Command Line Interface | Computer File
Nextron Systems on X: "THOR APT Scanner Registry Detection Examples - malware, manipulations, cache entries, backdoors, anomalies #DFIR #APT http://t.co/31lIk2GFH2" / X
THOR APT Scanner (@thor_scanner) / X
THOR APT Scanner v2 | Splunkbase
TryHackMe Yara Room | Haircutfish
Optimize Hacker Detection with Thor - We Detect Hackers - Enterprise Forensic Scanning - YouTube
THOR v10.2 Changes - Nextron Systems
THOR APT Scanner - Nextron Systems
THOR APT Scanner in Action - YouTube
THOR APT Scanner - Nextron Systems
THOR APT Scanner on X: "THOR TechPreview 10.7.3 has been released - Email file pareser - Support for more archive formats - Nested archive scanning - HTML report generation refactored - memory
THOR Apt Scanner | PPT
Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems
How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium