Malware Analysis as a Prey Animal
Threat Simulation – Beacons
MITRE ATT&CK Matrix – Custom C2 Protocol
AI-Hunter v3.5.0 Has Been Released!
MITRE ATT&CK Matrix – C2 Connection Proxy
Identifying Long Connections with Bro/Zeek
AI-Hunter v3.4 Has Been Released!
Bypassing Beaconing Detection with Metasploit
Free Threat Hunter Training
Detecting Beacons With Jitter
Identifying Beacons Through Session Size Analysis
Simplifying Beacon Analysis through Big Data Analysis