Current Handlers
Volunteer incident handlers donate their valuable time to analyze detects and anomalies, and post a daily
diary of their analysis and thoughts on the Storm Center website. Below you will find Handler details
including personal pages, additional scripts or papers, or whatever the respective handler is interested in
offering. All content is owned by the respective handler.
Interested in becoming a handler? A roadmap is available to learn how.
Mark Baggett
John Bambenek
Guy Bruneau
Tony Carothers
Jim Clausing
Jan Kopriva
Jesse La Grew
Renato Marinho
Russ McRee
Xavier Mertens
Richard Porter
Manuel Humberto Santander Pelaez
Didier Stevens
Yee Ching Tok
Johannes Ullrich
Rob VandenBrink
Tom Webb
Bojan Zdrnja
Mark Baggett

Twitter: | @markbaggett |
---|
Recent Diaries:
- SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics
- domain_stats.py a web api for SEIM phishing hunts
- System Resource Utilization Monitor
- Some tools updates
- Powershell Malware - No Hard drive, Just hard times
John Bambenek

John Bambenek is President of Bambenek Labs, a threat intelligence and digital investigations firm. He has spent 20 years in the industry helping research emerging threats and leading large-scale intelligence sharing communities to engage in targeted disruption of criminal activities online. He has developed a variety of techniques to conduct digital surveillance that is used to monitor domain generation algorithms and malware configurations which are used by thousands of organizations world-wide. In addition, he tracks financial transactions of various neonazi and supremacist individuals and organizations. He has spoken at conferences around the world, has published two books in addition to several book chapters and articles, and he once appears on the Daily Show with Jon Stewart.
Twitter: | @bambenek |
---|
Recent Diaries:
- Prophetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
- Writing Yara Rules for Fun and Profit: Notes from the FireEye Breach Countermeasures
- Hunting for SigRed Exploitation
- VMWare Security Advisory on DoS Vulnerability in ESXi
- MSFT July 2019 Patch Tuesday
Guy Bruneau

Guy has a B.A. (IT) from University of Quebec and holds the prestigious GIAC Security Expert (GSE) certification as well as the GIAC GSEC(G), GCIA(G), GCIH(G), GCUX(G), GCFA, GPEN certifications.
Twitter: | @guybruneau |
---|
Click to View Handler Created Tools
Recent Diaries:
- AI and Faster Attack Analysis [Guest Diary]
- Mass Internet Scanning from ASN 43350 [Guest Diary]
- SSH Tunneling in Action: direct-tcp requests [Guest Diary]
- Don?t Make it Easier than it Already is?..Default Passwords [Guest Diary]
- Automated Tools to Assist with DShield Honeypot Investigations [Guest Diary]
Tony Carothers

Recent Diaries:
- Zero Trust and Entra ID Conditional Access
- Cisco Security Advisory: Default Credentials
- Exploit o' the day: DROWN
- Disaster Recovery Starts with a Plan
- GnuPG (GPG) 2.1.9 release announced
Jim Clausing

Twitter: | @jclausing |
---|
Mastodon: | @clausing@infosec.exchange |
---|
Recent Diaries:
- New Tool: ficheck.py
- Tool update: mac-robber.py
- Unfurl v2025.02 released
- Tool update: sigs.py - added check mode
- New tool: immutable.py
Upcoming Courses:
SANS Tokyo Autumn 2025 - Live Online, Online | Japan Standard Time
October 20, 2025 - October 25, 2025
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS Tokyo Autumn 2025 - Live Online, Online | Japan Standard Time
October 27, 2025 - November 01, 2025
LINUX Incident Response and Threat Hunting
SANS DFIRCON Miami 2025, Coral Gables
November 17, 2025 - November 22, 2025
LINUX Incident Response and Threat Hunting
Jan Kopriva

Twitter: | @jk0pr |
---|
Mastodon: | @jkopriva@infosec.exchange |
---|
Recent Diaries:
- A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years
- Do sextortion scams still work in 2025?
- How quickly do we patch? A quick look from the global viewpoint
- Phishing e-mail that hides malicious link from Outlook users
- Another day, another phishing campaign abusing google.com open redirects
Jesse La Grew

Jesse La Grew has been an IT professional within higher education for over 20 years. He holds a variety of GIAC certifications including the GDSA, GCCC, GCFA, GCFE, GCIA, GPYC, GSOC, GCIH, GSEC, GISF, GCTI, GCPM and GSTRT and is also a CISSP. He recently received his Bachelor's Degree at SANS Technology Institute and is progressing through his Master's program at the same institution. Jesse's background in IT started in a desktop support role. This transitioned into a cyber security focus when becoming involved in building and supporting environments meeting PCI and FISMA compliance standards. He currently works as Chief Information Security Officer at Madison College.
Twitter: | @stealthcrane |
---|
Mastodon: | @stealthcrane@infosec.exchange |
---|
Recent Diaries:
- Reading Location Position Value in Microsoft Word Documents
- DShield Honeypot Log Volume Increase
- [Guest Diary] Anatomy of a Linux SSH Honeypot Attack: Detailed Analysis of Captured Malware
- Upcoming DShield Honeypot Changes and Customizations
- Usage of "passwd" Command in DShield Honeypots
Renato Marinho

Renato Marinho is Chief Research Officer at Morphus Labs. His journey in the area began in 2001, when he created Nettion, one of the first firewalls to use the contemporary UTM (Unified Threat Management) concept. Experienced in cyber security, Marinho was internationally recognized in 2016 by his research that unveiled Mamba, the first full disk encryption ransomware. At Morphus Labs, he oversees research, innovation and development of new products. Master and PhD candidate in Applied Informatics, he is also professor at University of Fortaleza teaching Computer Forensics in the post-graduate course. He is also a speaker having presented at Ignite Cybersecurity Conference, BSides Delaware, BSides Vienna, WSKS Portugal and Brazilian CSIRTs Forum.
Twitter: | @renato_marinho |
---|
Mastodon: | @renatomarinho@infosec.exchange |
---|
Recent Diaries:
- Microsoft August 2025 Patch Tuesday
- Microsoft April 2025 Patch Tuesday
- Microsoft February 2025 Patch Tuesday
- Microsoft January 2025 Patch Tuesday
- Microsoft November 2024 Patch Tuesday
Russ McRee

Twitter: | @holisticinfosec |
---|
Click to View Handler Created Tools
Recent Diaries:
- OctoSQL & Vulnerability Data
- ModelScan - Protection Against Model Serialization Attacks
- Sandfly Security
- Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
- Exploratory Data Analysis with CISSM Cyber Attacks Database - Part 1
Xavier Mertens

Xavier Mertens is a freelance security consultant based in Belgium. Xavier's own company (https://xameco.be) offers services like incident handling, forensic, SOC activities, and pentesting. He holds GCIA, GFCE, GCFA, GXPN, GREM, GDAT, GNFA, GCTI, GPYC SANS certifications but also CISSP, and CISA. Xavier is a SANS Certified Instructor (FOR610 - Malware Analysis and Reverse Engineering). His blog about security is https://blog.rootshell.be and he is co-organizer of the BruCON security conference (http://www.brucon.org).
Twitter: | @xme |
---|
Mastodon: | @xme@infosec.exchange |
---|
Recent Diaries:
- Interesting Technique to Launch a Shellcode
- Don't Forget The "-n" Command Line Switch
- CVE-2017-11882 Will Never Die
- Triage is Key! Python to the Rescue!
- Sinkholing Suspicious Scripts or Executables on Linux
Upcoming Courses:
SANS Live Online Europe October 2025, Online | Greenwich Mean Time
October 27, 2025 - October 31, 2025
Reverse-Engineering Malware: Advanced Code Analysis
SANS London November 2025, London
November 03, 2025 - November 08, 2025
Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS November Singapore 2025 - Live Online, Online | Singapore Standard Time
November 17, 2025 - November 21, 2025
Reverse-Engineering Malware: Advanced Code Analysis
Richard Porter

Twitter: | @packetalien |
---|
Click to View Handler Created Tools
Recent Diaries:
- To Simulate or Replicate: Crafting Cyber Ranges
- A Case for Lockdown and Isolation (and not the Covid kind)
- Microsoft April 2021 Patch Tuesday
- Building a .freq file with Public Domain Data Sources
- What is "THAT" Address Doing on my Network
Manuel Humberto Santander Pelaez

Mr. Santander Peláez currently serves as the CTO of Transportadora de Gas Internacional in Bogotá, Colombia. His areas of interest are Intrusion Detection, Computer Forensics, Incident Response, SCADA Security, cyber defense, threat intelligence and threat hunting.
Twitter: | @manuelsantander |
---|
Mastodon: | @manuelsantander@infosec.exchange |
---|
Recent Diaries:
- Noticing command and control channels by reviewing DNS protocols
- Controlling network access to ICS systems
- Management of DMARC control for email impersonation of domains in the .co TLD - part 2
- Management of DMARC control for email impersonation of domains in the .co TLD - part 1
- Security headers you should add into your application to increase cyber risk protection
Didier Stevens

Didier Stevens (Microsoft MVP Consumer Security) holds many certifications from SANS, Microsoft, Cisco, ... He is a Senior Analyst (NVISO https://www.nviso.be). Didier started his own company in 2012 to provide IT security training services (http://DidierStevensLabs.com). You can find his open source security tools on his IT security related blog at https://blog.DidierStevens.com.
Twitter: | @DidierStevens |
---|
Recent Diaries:
- pdf-parser: All Streams
- Wireshark 4.4.9 Released
- WinRAR MoTW Propagation Privacy
- Wireshark 4.4.8 Released
- ADS & Python Tools
Yee Ching Tok

Dr. Tok is currently a Senior Consultant at JT Consultancy & Management Pte. Ltd. and a Research Fellow at ASSET (Automated Systems SEcuriTy) Research Group in Singapore University of Technology and Design (SUTD) under the Information Systems Technology and Design (ISTD) Pillar. He was a recipient of the SG Digital (Postgraduate) Scholarship program from Infocomm Media Development Authority (IMDA), and won the Cybersecurity Awards in 2019 under the Professional category for his contributions to the Singapore information security industry. Yee Ching is a SANS Lethal Forensicator and also serves as a Co-Opted Committee Member in the Association of Information Security Professionals (AiSP). For more information, please visit https://poppopretn.com/aboutme/.
Twitter: | @poppopretn |
---|
Mastodon: | @poppopretn@infosec.exchange |
---|
Recent Diaries:
- SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations
- An ontology for threats, cybercrime and digital forensic investigation on Smart City Infrastructure
- The Curious Case of a 12-Year-Old Netgear Router Vulnerability
- PacketCrypt Classic Cryptocurrency Miner on PHP Servers
- Rolling Back Packages on Ubuntu/Debian
Johannes Ullrich

Dr. Johannes Ullrich is the Dean of Research and a faculty member of the SANS Technology Institute. In November of 2000, Johannes started the DShield.org project, which he later integrated into the Internet Storm Center. His work with the Internet Storm Center has been widely recognized. In 2004, Network World named him one of the 50 most powerful people in the networking industry. Secure Computing Magazine named him in 2005 one of the Top 5 influential IT security thinkers. His research interests include IPv6, Network Traffic Analysis and Secure Software Development. Johannes is regularly invited to speak at conferences and has been interviewed by major publications, radio as well as TV stations. He is a member of the SANS Technology Institute's Faculty and Administration as well as Curriculum and Long Range Planning Committee. As chief research officer for the SANS Institute, Johannes is currently responsible for the GIAC Gold program. Prior to working for SANS, Johannes worked as a lead support engineer for a Web development company and as a research physicist. Johannes holds a PhD in Physics from SUNY Albany and is located in Jacksonville, Florida. More Details: http://www.linkedin.com/in/johannesullrich
Twitter: | @johullrich |
---|
Mastodon: | @jullrich@infosec.exchange |
---|
Recent Diaries:
- Increasing Searches for ZIP Files
- Getting a Better Handle on International Domain Names and Punycode
- The end of an era: Properly formated IP addresses in all of our data.
- Airtell Router Scans, and Mislabeled usernames
- Increased Elasticsearch Recognizance Scans
Upcoming Courses:
SANS Network Security 2025, Las Vegas
September 22, 2025 - September 27, 2025
Application Security: Securing Web Apps, APIs, and Microservices
SANS CloudSecNext Summit & Training 2025, Denver
October 04, 2025 - October 09, 2025
Application Security: Securing Web Apps, APIs, and Microservices
SANS Dallas 2025, Dallas
December 01, 2025 - December 06, 2025
Application Security: Securing Web Apps, APIs, and Microservices
Rob VandenBrink

Twitter: | @rvandenbrink |
---|
Click to View Handler Created Tools
Recent Diaries:
- Keeping an Eye on MFA-Bombing Attacks
- NMAP Scanning without Scanning (Part 2) - The ipinfo API
- Scanning without Scanning with NMAP (APIs FTW)
- Why yq? Adventures in XML
- Got MFA? If not, Now is the Time!
Tom Webb

Twitter: | @twsecblog |
---|
Mastodon: | @tom_webb@infosec.exchange |
---|
Recent Diaries:
- Windows Defender Chrome Extension Detection
- Pi-Hole Pi4 Docker Deployment
- Are Local LLMs Useful in Incident Response?
- Zeek and Defender Endpoint
- IR Case/Alert Management
Bojan Zdrnja

Twitter: | @bojanz |
---|
Mastodon: | @bojanz@infosec.exchange |
---|
Click to View Handler Created Tools
Recent Diaries:
- Stealing Machine Keys for fun and profit (or riding the SharePoint wave)
- Credential Guard and Kerberos delegation
- The amazingly scary xz sshd backdoor
- Scanning and abusing the QUIC protocol
- Survival time for web sites
Upcoming Courses:
SANS London March 2026, London
March 02, 2026 - March 07, 2026
Web App Penetration Testing and Ethical Hacking