Cursed.Tools
Search...
K
Windows
Event Log Analyzer
Sigma Playground
Event ID Lookup
Native Executable Lookup
Coming Soon
Cookie Preferences
Feedback
Subscribe
Help & Support
Dashboard
About
ToS | Privacy | Policies
Roadmap
Loading...
Login
Sign-up
Open Beta
The Security Experience Platform
Find a cursed tool and make it work for you.
Event Log Analyzer
View and analyze Windows event log entries with filtering capabilities.
Sigma Playground
Create, test and validate Sigma detection rules for security monitoring.
Event ID Lookup
Lookup detailed information about Windows Event IDs and their meanings.
Native Executable Lookup
Search for native Windows executables and get detailed information about them.
Windows - Prefetch
Coming Soon
Analyze Windows prefetch files to understand application execution history.
Windows - Registry
Coming Soon
Explore Windows registry hives and their forensic significance.
Yara Rule Playground
Coming Soon
Create, test and validate Yara detection rules for security monitoring.
Network Forensics
Coming Soon
Analyze network traffic and security configurations for forensic investigations.
Web server logs
Coming Soon
Analyze and search through Windows event logs for security monitoring.
Memory - Volatility 3
Coming Soon
Reference guide for Windows event log IDs and their significance.
Linux log analysis
Coming Soon
Explore and analyze Linux logs and their forensic significance.
Mac log analysis
Coming Soon
Tools for macOS forensic analysis and security monitoring.
Link Analysis
Coming Soon
Analyze links and their forensic significance.
Snort Rule Playground
Coming Soon
Create, test and validate Snort detection rules for security monitoring.
Suricata Rule Playground
Coming Soon
Create, test and validate Suricata detection rules for security monitoring.