{"id":30954,"date":"2023-10-19T08:20:05","date_gmt":"2023-10-19T08:20:05","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=30954"},"modified":"2023-10-19T08:20:09","modified_gmt":"2023-10-19T08:20:09","slug":"aftermath","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/aftermath\/","title":{"rendered":"Aftermath &#8211; Swift-Powered Incident Response And Data Analysis"},"content":{"rendered":"\n<p>Aftermath is a Swift-based, open-source incident response framework.<\/p>\n\n\n\n<p>Aftermath can be leveraged by defenders in order to collect and subsequently analyze the data from the compromised host. Aftermath can be deployed from an MDM (ideally), but it can also run independently from the infected user&#8217;s command line.<\/p>\n\n\n\n<p>Aftermath first runs a series of modules for collection. The output of this will either be written to the location of your choice, via the&nbsp;<code>-o<\/code>&nbsp;or&nbsp;<code>--output<\/code>&nbsp;option, or by default, it is written to the&nbsp;<code>\/tmp<\/code>&nbsp;directory.<\/p>\n\n\n\n<p>Once collection is complete, the final zip\/archive file can be pulled from the end user&#8217;s disk. This file can then be analyzed using the&nbsp;<code>--analyze<\/code>&nbsp;argument pointed at the archive file. The results of this will be written to the&nbsp;<code>\/tmp<\/code>&nbsp;directory. <\/p>\n\n\n\n<p>The administrator can then unzip that analysis directory and see a parsed view of the locally collected databases, a timeline of files with the file creation, last accessed, and last modified dates (if they&#8217;re available), and a storyline which includes the file metadata, database changes, and browser information to potentially track down the infection vector.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-build\"><strong><a href=\"https:\/\/github.com\/stuartjash\/aftermath#build\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Build<\/a><\/strong><\/h2>\n\n\n\n<p>To build Aftermath locally, clone it from the repositorygit clone https:\/\/github.com\/jamf\/aftermath.git<\/p>\n\n\n\n<p><code>cd<\/code>&nbsp;into the Aftermath directorycd &lt;path_to_aftermath_directory&gt;<\/p>\n\n\n\n<p>Build using Xcodexcodebuild -scheme &#8220;aftermath&#8221;<\/p>\n\n\n\n<p><code>cd<\/code>&nbsp;into the Release foldercd build\/Release<\/p>\n\n\n\n<p>Run aftermathsudo .\/aftermath<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-usage\"><strong><a href=\"https:\/\/github.com\/stuartjash\/aftermath#usage\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Usage<\/a><\/strong><\/h2>\n\n\n\n<p>Aftermath needs to be root, as well as have&nbsp;<em>full disk access (FDA)<\/em>&nbsp;in order to run. FDA can be granted to the Terminal application in which it is running.<\/p>\n\n\n\n<p>The default usage of Aftermath runssudo .\/aftermath<\/p>\n\n\n\n<p>To specify certain optionssudo .\/aftermath [option1] [option2]<\/p>\n\n\n\n<p>Examplessudo .\/aftermath -o \/Users\/user\/Desktop &#8211;deepsudo .\/aftermath &#8211;analyze &lt;path_to_collection_zip&gt;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-external-unified-log-predicates\"><a href=\"https:\/\/github.com\/stuartjash\/aftermath#external-unified-log-predicates\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>External Unified Log Predicates<\/strong><\/a><\/h2>\n\n\n\n<p>Users have the ability to pass Aftermath a text file of unified log predicates using the&nbsp;<code>--logs<\/code>&nbsp;or&nbsp;<code>-l<\/code>&nbsp;arguments. The file being passed to Aftermath is required to be a text file and each predicate needs to be newline-separated. <\/p>\n\n\n\n<p>In addition, each line item will be a dictionary object. The key in the dictionary will whatever the user desires to call this predicate. <\/p>\n\n\n\n<p>For example, if you want to see all login events, we will create a predicate and title it&nbsp;<code>login_events<\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>login_events: processImagePath contains \"loginwindow\" and eventMessage contains \"com.apple.sessionDidLogin\ntcc: process == \"tccd\"<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-note\"><a href=\"https:\/\/github.com\/stuartjash\/aftermath#note\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Note<\/strong><\/a><\/h2>\n\n\n\n<p>Because&nbsp;<code>eslogger<\/code>&nbsp;and&nbsp;<code>tcpdump<\/code>&nbsp;run on additional threads and the goal is to collect as much data from them as possible, they exit when aftermath exits. Because of this, the last line of the eslogger json file or the pcap file generated from tcpdump may be truncated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-releases\"><strong><a href=\"https:\/\/github.com\/stuartjash\/aftermath#releases\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Releases<\/a><\/strong><\/h2>\n\n\n\n<p>There is an Aftermath.pkg available under&nbsp;<a href=\"https:\/\/github.com\/jamf\/aftermath\/releases\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Releases<\/a>. This pkg is signed and notarized. It will install the aftermath binary at&nbsp;<code>\/usr\/local\/bin\/<\/code>. <\/p>\n\n\n\n<p>This would be the ideal way to deploy via MDM. Since this is installed in&nbsp;<code>bin<\/code>, you can then run aftermath likesudo aftermath [option1] [option2]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-uninstall\"><strong><a href=\"https:\/\/github.com\/stuartjash\/aftermath#uninstall\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Uninstall<\/a><\/strong><\/h2>\n\n\n\n<p>To uninstall the aftermath binary, run the&nbsp;<code>AftermathUninstaller.pkg<\/code>&nbsp;from the&nbsp;<a href=\"https:\/\/github.com\/jamf\/aftermath\/releases\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Releases<\/a>. This will uninstall the binary and also run&nbsp;<code>aftermath --cleanup<\/code>&nbsp;to remove aftermath directories. <\/p>\n\n\n\n<p>If any aftermath directories reside elsewhere, from using the&nbsp;<code>--output<\/code>&nbsp;command, it is the responsibility of the user\/admin to remove said directories.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-help-menu\"><strong><a href=\"https:\/\/github.com\/stuartjash\/aftermath#help-menu\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Help Menu<\/a><\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>--analyze -&gt; analyze the results of the Aftermath results\n     usage: --analyze &lt;path_to_aftermath_collection_file&gt;\n--collect-dirs -&gt; specify locations of (space-separated) directories to dump those raw files\n    usage: --collect-dirs &lt;path_to_dir&gt; &lt;path_to_another_dir&gt;\n--deep or -d -&gt; perform a deep scan of the file system for modified and accessed timestamped metadata\n    WARNING: This will be a time-intensive, memory-consuming scan.\n--disable -&gt; disable a set of aftermath features that may collect personal user data\n    Available features to disable: browsers -&gt; collecting browser information | browser-killswitch -&gt; force-closes browers | -&gt; databases -&gt; tcc &amp; lsquarantine databases | filesystem -&gt; walking the filesystem for timestamps | proc-info -&gt; collecting process information via TrueTree and eslogger | all -&gt; all aforementioned options \n    usage: --disable browsers browser-killswitch databases filesystem proc-info slack\n           --disable all\n--es-logs -&gt; specify which Endpoint Security events (space-separated) to collect (defaults are: create exec mmap). To disable, see --disable es-logs\n    usage: --es-logs setuid unmount write\n--logs -&gt; specify an external text file with unified log predicates (as dictionary objects) to parse\n    usage: --logs \/Users\/&lt;USER&gt;\/Desktop\/myPredicates.txt\n-o or --output -&gt; specify an output location for Aftermath collection results (defaults to \/tmp)\n     usage: -o Users\/user\/Desktop\n--pretty -&gt; colorize Terminal output\n--cleanup -&gt; remove Aftermath folders from default locations (\"\/tmp\", \"\/var\/folders\/zz\/) <\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently analyze the data from the compromised host. Aftermath can be deployed from an MDM (ideally), but it can also run independently from the infected user&#8217;s command line. Aftermath first runs a series of modules for [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":30956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[6372,737,6321,6052,6325],"class_list":["post-30954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-aftermath","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aftermath - Swift-Powered Incident Response And Data Analysis<\/title>\n<meta name=\"description\" content=\"Aftermath is a Swift-based, open-source incident response framework.Aftermath can be leveraged by defenders in order to collect\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/aftermath\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aftermath - Swift-Powered Incident Response And Data Analysis\" \/>\n<meta property=\"og:description\" content=\"Aftermath is a Swift-based, open-source incident response framework.Aftermath can be leveraged by defenders in order to collect\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/aftermath\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T08:20:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-19T08:20:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Aftermath &#8211; Swift-Powered Incident Response And Data Analysis\",\"datePublished\":\"2023-10-19T08:20:05+00:00\",\"dateModified\":\"2023-10-19T08:20:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/\"},\"wordCount\":547,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp\",\"keywords\":[\"Aftermath\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/aftermath\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/\",\"name\":\"Aftermath - Swift-Powered Incident Response And Data Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp\",\"datePublished\":\"2023-10-19T08:20:05+00:00\",\"dateModified\":\"2023-10-19T08:20:09+00:00\",\"description\":\"Aftermath is a Swift-based, open-source incident response framework.Aftermath can be leveraged by defenders in order to collect\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/aftermath\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aftermath\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aftermath - Swift-Powered Incident Response And Data Analysis","description":"Aftermath is a Swift-based, open-source incident response framework.Aftermath can be leveraged by defenders in order to collect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/aftermath\/","og_locale":"en_US","og_type":"article","og_title":"Aftermath - Swift-Powered Incident Response And Data Analysis","og_description":"Aftermath is a Swift-based, open-source incident response framework.Aftermath can be leveraged by defenders in order to collect","og_url":"https:\/\/kalilinuxtutorials.com\/aftermath\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-10-19T08:20:05+00:00","article_modified_time":"2023-10-19T08:20:09+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/aftermath\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/aftermath\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Aftermath &#8211; Swift-Powered Incident Response And Data Analysis","datePublished":"2023-10-19T08:20:05+00:00","dateModified":"2023-10-19T08:20:09+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/aftermath\/"},"wordCount":547,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/aftermath\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp","keywords":["Aftermath","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/aftermath\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/aftermath\/","url":"https:\/\/kalilinuxtutorials.com\/aftermath\/","name":"Aftermath - Swift-Powered Incident Response And Data Analysis","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/aftermath\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/aftermath\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp","datePublished":"2023-10-19T08:20:05+00:00","dateModified":"2023-10-19T08:20:09+00:00","description":"Aftermath is a Swift-based, open-source incident response framework.Aftermath can be leveraged by defenders in order to collect","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/aftermath\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/aftermath\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj14aJyQyrZRovQUljShWi1KQCcaP4lrnuHF_PocF_rtiJhmDLkzc8vvFPhIXQdeJPqTY936Tcee3lC1ANhzIlnNkeC0_2y9JMwCA-uHAgHxAHI6tBwdt7ZXMhgpd5fw4h3t5gU3orkCsE6J2lwXf3nJJ72REiVR5_YkFFJes359joqTNXQhFg6ErsYeR9V\/s16000\/Untitled%20design%20(35).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":19439,"url":"https:\/\/kalilinuxtutorials.com\/linuxcatscale\/","url_meta":{"origin":30954,"position":0},"title":"LinuxCatScale : Incident Response Collection And Processing Scripts With Automated Reporting Scripts","author":"R K","date":"October 26, 2021","format":false,"excerpt":"Linux CatScale is a bash script that uses live of the land tools to collect extensive data from Linux based hosts. The data aims to help DFIR professionals triage and scope incidents. An Elk Stack instance also is configured to consume the output and assist the analysis process. Usage This\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjS3YyyPupAs5auxeaTIjoGWUdQCjfZ-oP8gj2inIj1rwzT_gE83Pm5Ya0fwPQIA2stnTb6hwqd-pRhNGG57xesXFd3dtZw_rk79mNuy6o0G5zq4-13SGWSkyvW4tDb8YuHfuxfxl2aajO1nb4KIFihJyUqGaQ_38ib82G3S5ptsZ1Q2bBc9Bd4CTvj=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjS3YyyPupAs5auxeaTIjoGWUdQCjfZ-oP8gj2inIj1rwzT_gE83Pm5Ya0fwPQIA2stnTb6hwqd-pRhNGG57xesXFd3dtZw_rk79mNuy6o0G5zq4-13SGWSkyvW4tDb8YuHfuxfxl2aajO1nb4KIFihJyUqGaQ_38ib82G3S5ptsZ1Q2bBc9Bd4CTvj=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjS3YyyPupAs5auxeaTIjoGWUdQCjfZ-oP8gj2inIj1rwzT_gE83Pm5Ya0fwPQIA2stnTb6hwqd-pRhNGG57xesXFd3dtZw_rk79mNuy6o0G5zq4-13SGWSkyvW4tDb8YuHfuxfxl2aajO1nb4KIFihJyUqGaQ_38ib82G3S5ptsZ1Q2bBc9Bd4CTvj=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjS3YyyPupAs5auxeaTIjoGWUdQCjfZ-oP8gj2inIj1rwzT_gE83Pm5Ya0fwPQIA2stnTb6hwqd-pRhNGG57xesXFd3dtZw_rk79mNuy6o0G5zq4-13SGWSkyvW4tDb8YuHfuxfxl2aajO1nb4KIFihJyUqGaQ_38ib82G3S5ptsZ1Q2bBc9Bd4CTvj=s728 2x"},"classes":[]},{"id":7229,"url":"https:\/\/kalilinuxtutorials.com\/dfirtriage-digital-forensic-acquisition\/","url_meta":{"origin":30954,"position":1},"title":"DFIRTriage : Digital Forensic Acquisition Tool For Windows Based Incident Response","author":"R K","date":"November 12, 2019","format":false,"excerpt":"DFIRTriage is a Digital forensic acquisition tool for Windows-based incident response. This tool intended to provide Incident Responders with rapid host data. Written in Python, the code has been compiled to eliminate the dependency of python on the target host.\u00a0 The tool will run a variety of commands automatically upon\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":34479,"url":"https:\/\/kalilinuxtutorials.com\/snaffler-output-file-parser\/","url_meta":{"origin":30954,"position":2},"title":"Snaffler Output File Parser &#8211; Enhancing Data Analysis With Advanced Features","author":"Varshini","date":"August 19, 2024","format":false,"excerpt":"Especially in large environments, the Snaffler output gets very large and time-consuming to analyze. This script parse the Snaffler output file (TSV format required) and: Beautify it: Proper tables and different output formats like TXT, CSV, HTML, JSON or PS Gridview. The HTML output file: Supports basic sorting and filtering\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQERSy440P6LNTjUAPhuedP6zyd1QIBjV2ZwTmdgfxDSXMYuCSPLQiXLmhuawZKJUErErzLTewb9RvxaHSL18J7vC2AxEXmr8rY-3pf-rpVdmhlHRonB3rd-3FLiY3M2-a0aeiZrW2Aoeyirl4aLevAHaqehaFTc_EvwD6MxzLFkV_jD2sSN5hvdNrtA5O\/s16000\/Snaffler%20Output%20File%20Parser.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQERSy440P6LNTjUAPhuedP6zyd1QIBjV2ZwTmdgfxDSXMYuCSPLQiXLmhuawZKJUErErzLTewb9RvxaHSL18J7vC2AxEXmr8rY-3pf-rpVdmhlHRonB3rd-3FLiY3M2-a0aeiZrW2Aoeyirl4aLevAHaqehaFTc_EvwD6MxzLFkV_jD2sSN5hvdNrtA5O\/s16000\/Snaffler%20Output%20File%20Parser.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQERSy440P6LNTjUAPhuedP6zyd1QIBjV2ZwTmdgfxDSXMYuCSPLQiXLmhuawZKJUErErzLTewb9RvxaHSL18J7vC2AxEXmr8rY-3pf-rpVdmhlHRonB3rd-3FLiY3M2-a0aeiZrW2Aoeyirl4aLevAHaqehaFTc_EvwD6MxzLFkV_jD2sSN5hvdNrtA5O\/s16000\/Snaffler%20Output%20File%20Parser.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQERSy440P6LNTjUAPhuedP6zyd1QIBjV2ZwTmdgfxDSXMYuCSPLQiXLmhuawZKJUErErzLTewb9RvxaHSL18J7vC2AxEXmr8rY-3pf-rpVdmhlHRonB3rd-3FLiY3M2-a0aeiZrW2Aoeyirl4aLevAHaqehaFTc_EvwD6MxzLFkV_jD2sSN5hvdNrtA5O\/s16000\/Snaffler%20Output%20File%20Parser.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQERSy440P6LNTjUAPhuedP6zyd1QIBjV2ZwTmdgfxDSXMYuCSPLQiXLmhuawZKJUErErzLTewb9RvxaHSL18J7vC2AxEXmr8rY-3pf-rpVdmhlHRonB3rd-3FLiY3M2-a0aeiZrW2Aoeyirl4aLevAHaqehaFTc_EvwD6MxzLFkV_jD2sSN5hvdNrtA5O\/s16000\/Snaffler%20Output%20File%20Parser.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQERSy440P6LNTjUAPhuedP6zyd1QIBjV2ZwTmdgfxDSXMYuCSPLQiXLmhuawZKJUErErzLTewb9RvxaHSL18J7vC2AxEXmr8rY-3pf-rpVdmhlHRonB3rd-3FLiY3M2-a0aeiZrW2Aoeyirl4aLevAHaqehaFTc_EvwD6MxzLFkV_jD2sSN5hvdNrtA5O\/s16000\/Snaffler%20Output%20File%20Parser.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28458,"url":"https:\/\/kalilinuxtutorials.com\/sandfly-entropyscan-entropy-scanner-for-linux-to-detect-packed-encrypted-binaries-related-to-malware\/","url_meta":{"origin":30954,"position":3},"title":"Sandfly-Entropyscan : Entropy Scanner For Linux To Detect Packed \/ Encrypted Binaries Related To Malware","author":"R K","date":"February 25, 2023","format":false,"excerpt":"Sandfly-Entropyscan is an Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes. Sandfly-Entropyscan is a utility to quickly scan files or running processes and report on their entropy (measure of randomness) and if they\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHFoftROls_al2XKB1WYiINrZfyPSsdyOchmkQ91DkxTlbqKA5gfV2p2aWkfmsxFHhaBTeWvhfVByAKCJVuiYRkdiNgMIkeCfShRFroNWhAy35o334ul6m-DBCXmnjCUF7DCANFDfXgqsOpRCPjKZIRqYX4sJim0aTG81vsFeJ-KP1P1tGMg4M7bp3\/s16000\/scan.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHFoftROls_al2XKB1WYiINrZfyPSsdyOchmkQ91DkxTlbqKA5gfV2p2aWkfmsxFHhaBTeWvhfVByAKCJVuiYRkdiNgMIkeCfShRFroNWhAy35o334ul6m-DBCXmnjCUF7DCANFDfXgqsOpRCPjKZIRqYX4sJim0aTG81vsFeJ-KP1P1tGMg4M7bp3\/s16000\/scan.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHFoftROls_al2XKB1WYiINrZfyPSsdyOchmkQ91DkxTlbqKA5gfV2p2aWkfmsxFHhaBTeWvhfVByAKCJVuiYRkdiNgMIkeCfShRFroNWhAy35o334ul6m-DBCXmnjCUF7DCANFDfXgqsOpRCPjKZIRqYX4sJim0aTG81vsFeJ-KP1P1tGMg4M7bp3\/s16000\/scan.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHFoftROls_al2XKB1WYiINrZfyPSsdyOchmkQ91DkxTlbqKA5gfV2p2aWkfmsxFHhaBTeWvhfVByAKCJVuiYRkdiNgMIkeCfShRFroNWhAy35o334ul6m-DBCXmnjCUF7DCANFDfXgqsOpRCPjKZIRqYX4sJim0aTG81vsFeJ-KP1P1tGMg4M7bp3\/s16000\/scan.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5982,"url":"https:\/\/kalilinuxtutorials.com\/amira-automated-malware-analysis\/","url_meta":{"origin":30954,"position":4},"title":"AMIRA: Automated Malware Incident Response &#038; Analysis","author":"R K","date":"July 30, 2019","format":false,"excerpt":"AMIRA is a service for automatically running the analysis on the\u00a0OSXCollector\u00a0output files. The automated analysis is performed via\u00a0OSXCollector Output Filters, in particular\u00a0The One Filter to Rule Them All: the\u00a0Analyze Filter. It takes care of retrieving the output files from an S3 bucket, running the Analyze Filter and then uploading the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32346,"url":"https:\/\/kalilinuxtutorials.com\/awesome-incident-response\/","url_meta":{"origin":30954,"position":5},"title":"Awesome Incident Response &#8211; Essential Tools And Resources","author":"Varshini","date":"March 18, 2024","format":false,"excerpt":"Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to a security incident, including gathering evidence of the incident, remediating its effects, and implementing controls to prevent the incident from recurring in the future. Contents Adversary Emulation All-In-One Tools Books\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=30954"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30954\/revisions"}],"predecessor-version":[{"id":30958,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30954\/revisions\/30958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/30956"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=30954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=30954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=30954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}