![How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Sep, 2023 | Medium How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Sep, 2023 | Medium](https://miro.medium.com/v2/resize:fit:1400/1*tTxbUq4-aRcwzlPKYCoi2g.png)
How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Sep, 2023 | Medium
![How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Sep, 2023 | Medium How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Sep, 2023 | Medium](https://miro.medium.com/v2/resize:fit:2000/1*9NTcqrqP4snY9ZDUjDRIfw.png)
How to scan systems with THOR lite scanner during compromise assessment and incident response | by Md. Mahim Bin Firoj | Sep, 2023 | Medium
![Nextron Systems on X: "THOR 10 ⚡️ Lite Free YARA and IOC scanner - Fast and stable - Reduced feature set - Uses the open-source signature set used in LOKI - Windows, Nextron Systems on X: "THOR 10 ⚡️ Lite Free YARA and IOC scanner - Fast and stable - Reduced feature set - Uses the open-source signature set used in LOKI - Windows,](https://pbs.twimg.com/media/ETy8uDgWoAE0RWJ.jpg:large)