filter: 7 entries
Detection Guide T1059.001 2026-05-22
Detecting Malicious PowerShell Execution — From Script Block Logging to AMSI
PowerShell remains one of the most abused tools in the attacker's arsenal. This guide covers the full detection stack — script block logging, module logging, transcription, AMSI, and Sigma rules for hunting obfuscated and encoded commands.
Hunt Playbook T1218 2025-11-28
Hunting Living-Off-the-Land Binaries: certutil, mshta, regsvr32, and wscript
A threat hunt playbook for detecting LOLBin abuse — adversaries using native Windows binaries to execute payloads, download files, and evade detection. Covers certutil, mshta, regsvr32, and wscript with Sigma rules and hunting queries.
Tool Review 2025-11-18
Velociraptor for Endpoint Threat Hunting: A Practical Guide
A hands-on review of Velociraptor for endpoint threat hunting. Covers VQL query language basics, artifact collection, live response, and building custom hunt artifacts for large environments.
Detection Guide 2025-11-10
Detecting C2 Beaconing and DNS Tunneling with Frequency Analysis
A deep dive into C2 beaconing detection using statistical analysis of connection timing and DNS query patterns. Learn how to identify beacon sleep intervals, jitter patterns, and DNS exfiltration using log-based analytics.
Detection Guide 2025-11-01
Writing Sigma Rules from Scratch: A Practical Guide
Learn to write detection rules in Sigma — the vendor-neutral rule format for SIEM detections. Covers logsource types, condition syntax, field mappings, and how to test and tune rules before deploying.
Hunt Playbook 2025-10-22
Threat Hunting Lateral Movement via SMB, PsExec, and WMI
A structured threat hunt playbook for identifying lateral movement activity using SMB-based tooling. Covers PsExec, Impacket, WMI execution, and the network and host artifacts each leaves behind.
Detection Guide T1003.001 2025-10-15
Detecting LSASS Credential Dumping on Windows
A practical detection guide for identifying Mimikatz, procdump, and other tools targeting LSASS memory. Covers Sysmon events, Windows Security logs, and Sigma rules you can deploy today.