Threat Hunting & Detection Handbook
  • About
  • Threat Hunting and Detection
    • Initial Access
    • Execution
    • Persistence
    • Lateral Movement
    • Command and Control
      • Enterprise Scale C2 Beacon Detection with Unsupervised ML and KQL — Part 1
      • Enterprise Scale C2 Beacon Detection with Unsupervised ML and KQL — Part 2
      • Implementing RITA using KQL
Powered by GitBook
On this page
  • Contents
  • Want to Support?
  • Social

Was this helpful?

About

This book is a place for all kinds of content related to threat hunting and detection.

NextInitial Access

Last updated 3 years ago

Was this helpful?

Contents

This book contains guides that you can apply with your tools. In addition, It contains detection content for Azure Sentinel and Microsoft 365 Defender suite. Many of the detection content can also be converted to Splunk queries since KQL and SPL are quite similar. Detection content is published on GitHub:

Want to Support?

Social

Warning This book is created by Cloning it AND presenting it as your own is illegal and forbidden. If you do so, it might have an impact on your career. Please don't do it. Cloning, using, giving credits, and referencing is OK and much appreciated.

If you like my work, have benefited from it, and want to show appreciation, you can .

@Cyb3rMonk
buy me a coffee
GitHub - Cyb3r-Monk/Threat-Hunting-and-Detection: Repository for threat hunting and detection queries, tools, etc.GitHub
Logo