MalChela 3.2: More Cowbell? More Intel!
One of the things I value most about the open-source community is that the best improvements to a tool often donât come from inside it â they come from outside conversations.  A short while back, the author of mlget, xorhex,  reached out and suggested I addâŚ
Posts by Doug Metz
For anyone interested Iâve expanded this into a series. Feel free to let me know what else youâd like to see youtube.com/playlist?lis...
An AI image of Jesus rising in a cyber apocalyptic landscape
Just got an email for a âCyber Easterâ sale. Can we please stop making everything Cyber?
Yes I wrote CyberPipe and host Cyber Unpacked⌠but stillâŚ
A Study in DFIR: Open-Source, Enterprise, and the Art of Analysis
Someone asked me recently how I see DFIR evolving â tooling, automation, and open-source versus enterprise platforms. It's the kind of question that sounds like a conference panel topic, but the answer is grounded in how workâŚ
New YouTube Video series covering the free open-source YARA & Malware Analysis toolkit, MalChela. Covers installation, Initial static analysis, YARA rule creation, REMnux integration and more.
MalChela Meets AI: Three Paths to Smarter Malware Analysis
In a previous post I wrote about integrating MalChela with OpenCode on REMnux and giving the AI a quick briefing on the tool suite so it could incorporate them into its analysis workflow. That was a promising proof of concept, but itâŚ
On Feb 24 at Magnet's FREE virtual summit, @dwmetz.bsky.social and I will be talking about DF and IR, but not about "DFIR", if you know what I mean. magnetvirtualsummit.com/registration... #DFIR
@aaroncti.bsky.social interested in seeing the platform
Streamline Malware Hash Search with FOSSOR
Weâve all encountered this scenario: youâre reading a threat report from CISA or Microsoft and come across hashes related to a malware infection. You start copying these hashes and head to one of your favorite virus repositories to check if thereâs aâŚ
Enhancing Malware Analysis with REMnux and AI
Those familiar with my work know that Iâm a big fan of the REMnux Linux distribution for malware analysis. When I developed MalChela, I included a custom configuration that can be invoked that not only includes the MalChela tool suite but alsoâŚ
Sounds pretty atomic
Wrapping up 2025 with the year in code, including the evolution of MalChela for malware analysis, streamlined CyberPipe tools, and the introduction of Toby, a portable forensics platform. Focus was on creating practical solutions for #DFIR professionals and students for triage and #MalwareAnalysis
What a startâŚ
CyberPipe-Timeliner was developed to integrate Magnet Response collections with ForensicTimeliner. This tool automates the workflow of EZTools, and transforms collection data into a unified forensic timeline. #DFIR
CyberPipe v5.3: Enhanced PowerShell Compatibility and Reliability
I'm pleased to announce the release of CyberPipe v5.3, bringing critical compatibility improvements for Windows PowerShell 5.1 and enhanced reliability across all PowerShell environments. The Problem After releasing v5.2 with theâŚ
God is an Eagles fan. #GoBirds
You'll pry these Oxford commas out of my cold, dead, third thing hands
CyberPipe, a PowerShell script for digital evidence collection, has been updated with enhancements in collection, capabilities, and reliability. New features include intelligent collection with dual disk space validation, a QuickTriage profile, and improved BitLocker recovery. #DFIR
Swore I was reading @theonion.com
A trick and a treat this week with a quiet milestone for cross-platform DFIR tooling â MalChelaGUI now runs seamlessly inside Windows through Ubuntu WSL2, with zero configuration required. #DFIR #MalwareAnalysis
On Oct 8, join us for a special episode of #CyberUnpacked where hosts @dwmetz.bsky.social & Jeff Rutherford will bring together a panel of #DFIR leaders to explore top challenges investigative teams face and the state of #DigitalInvestigations today: ow.ly/jRVq50X2r0L
Go Birds!
Masked ICE arenât about safety; theyâre about fear and evading responsibility. Demand transparency and accountability by adding your name to this petition:
In DFIR, reliable storage is essential for effective workflows. Crabwise, a USB benchmarking utility, addresses performance variability by calculating read and write speeds under direct conditions, bypassing caching and logs results for easy comparison. #DFIR
MalChela 3.0.2 introduces MITRE Lookup, a tool that allows forensic investigators to search the MITRE ATT&CK framework offline. This feature enhances investigation speed by supporting keyword and Technique ID searches while providing tactic categories and detection guidance. #DFIR #MalwareAnalysis
đđ Toby ! :)