Linux threat hunting using CUT SORT UNIQ DIFF
Linux threat hunting
Network Threat Hunting with Outbound Traffic
In the complex environment of cybersecurity, proactive threat hunting is one of the best solution to staying one step ahead… read out Network Threat Hunting with Outbound Traffic
Threat Hunting for Suspicious Schedule Task
Project Name: Threat Hunting for Suspicious Schedule Task Description: Attacker uses scheduled tasks to deliver their payload on OS level. This… read out Threat Hunting for Suspicious Schedule Task
Threat Hunting with Authentication Events
Project Name: Threat Hunting with Authentication Events. Description: The primary aim of authentication threat hunting is to reduce the time needed… read out Threat Hunting with Authentication Events
Network Threat Hunting Using Bmon
Project Name: Network Threat Hunting Using Bmon Linux commands are most powerful way to analyze traffic and find anomaly & attacks…. read out Network Threat Hunting Using Bmon