Cursed.Tools
Search...
K
Windows
Event Log Analyzer
Registry Analyzer
Prefetch Analyzer
Sigma Playground
Event ID Lookup
Native Executable Lookup
Detection
Yara-X Playground
Coming Soon
Cookie Preferences
Feedback
Subscribe
Help & Support
Dashboard
About
ToS | Privacy | Policies
Roadmap
Sign Up For Free Credits
Loading...
Login
Sign-up
Open Beta
The Security Experience Platform
Find a cursed tool and make it work for you.
Event Log Analyzer
View and analyze Windows event log entries with filtering capabilities.
Registry Analyzer
Explore Windows registry hives and their key forensic artifacts.
Prefetch Analyzer
Analyze Windows prefetch files to understand application execution history.
Sigma Playground
Create, test and validate Sigma detection rules for security monitoring.
Event ID Lookup
Lookup detailed information about Windows Event IDs and their meanings.
Native Executable Lookup
Search for native Windows executables and get detailed information about them.
Yara-X Playground
Create, test and validate Yara detection rules for security monitoring.
Network Forensics
Coming Soon
Analyze network traffic and security configurations for forensic investigations.
Web server logs
Coming Soon
Analyze and search through Windows event logs for security monitoring.
Memory - Volatility 3
Coming Soon
Reference guide for Windows event log IDs and their significance.
Linux log analysis
Coming Soon
Explore and analyze Linux logs and their forensic significance.
Mac log analysis
Coming Soon
Tools for macOS forensic analysis and security monitoring.
Link Analysis
Coming Soon
Analyze links and their forensic significance.
Snort Rule Playground
Coming Soon
Create, test and validate Snort detection rules for security monitoring.
Suricata Rule Playground
Coming Soon
Create, test and validate Suricata detection rules for security monitoring.