![How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium](https://miro.medium.com/v2/resize:fit:2000/1*9NTcqrqP4snY9ZDUjDRIfw.png)
How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium
![Nextron Systems on X: "THOR APT Scanner Registry Detection Examples - malware, manipulations, cache entries, backdoors, anomalies #DFIR #APT http://t.co/31lIk2GFH2" / X Nextron Systems on X: "THOR APT Scanner Registry Detection Examples - malware, manipulations, cache entries, backdoors, anomalies #DFIR #APT http://t.co/31lIk2GFH2" / X](https://pbs.twimg.com/media/CEkhWA9XIAA7-mG.png)
Nextron Systems on X: "THOR APT Scanner Registry Detection Examples - malware, manipulations, cache entries, backdoors, anomalies #DFIR #APT http://t.co/31lIk2GFH2" / X
![How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Medium](https://miro.medium.com/v2/resize:fit:875/1*ke8UuGlxtOkYY4b_q82t9A.png)