Detection Engineering Intelligence
Hunt Smarter.
Detect Faster.
Respond Better.
Practical detection guides, hunt playbooks, and tool reviews for SOC analysts and detection engineers. Real techniques, real rules, real tradecraft.
7 Articles
4 Detection Guides
2 Hunt Playbooks
3 MITRE Mapped
Recent Articles
View all → Detection Guide → Hunt Playbook → Tool Review → Detection Guide → Detection Guide → Hunt Playbook →
Detecting Malicious PowerShell Execution — From Script Block Logging to AMSI
Hunting Living-Off-the-Land Binaries: certutil, mshta, regsvr32, and wscript
Velociraptor for Endpoint Threat Hunting: A Practical Guide
Detecting C2 Beaconing and DNS Tunneling with Frequency Analysis
Writing Sigma Rules from Scratch: A Practical Guide
Threat Hunting Lateral Movement via SMB, PsExec, and WMI
Stay Current on Detection Engineering
Subscribe to the RSS feed for new detection guides, hunt playbooks, and tool reviews as they're published.