Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.
I've just created a repo for a log parser that works on almost all infostealer logs. It's developed with python and some bash, give an opinion.