Hunting Windows Event Logs

Threat Hunting Process Injection With Jupyter Notebook and Sysmon

Hunting for Persistence in Linux (Part 1): Auditd, Sysmon, Osquery (and Webshells)

Threat Hunting Over the Network With Zeek and RITA