Date Author Title
2021-03-17Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2020-08-24Xavier MertensTracking A Malware Campaign Through VT
2020-01-25Guy BruneauIs Threat Hunting the new Fad?
2020-01-21Russ McReeDeepBlueCLI: Powershell Threat Hunting
2019-10-10Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-07-17Xavier MertensAnalyzis of DNS TXT Records
2019-03-27Xavier MertensRunning your Own Passive DNS Service
2018-11-20Xavier MertensQuerying DShield from Cortex
2018-10-17Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-09-20Xavier MertensHunting for Suspicious Processes with OSSEC
2018-08-10Remco VerhoefHunting SSL/TLS clients using JA3
2018-06-21Xavier MertensAre Your Hunting Rules Still Working?
2017-12-02Xavier MertensUsing Bad Material for the Good
2017-11-23Xavier MertensProactive Malicious Domain Search
2017-10-18Renato MarinhoBaselining Servers to Detect Outliers
2017-09-02Xavier MertensAutoIT based malware back in the wild
2017-03-15Xavier MertensRetro Hunting!
2016-07-12Xavier MertensHunting for Malicious Files with MISP + OSSEC