<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>SOC Analyst Hub</title><description>Detection Engineering Intelligence for SOC Teams</description><link>https://soc-analyst-hub.pages.dev/</link><language>en-us</language><item><title>Detecting Malicious PowerShell Execution — From Script Block Logging to AMSI</title><link>https://soc-analyst-hub.pages.dev/articles/detecting-malicious-powershell-execution/</link><guid isPermaLink="true">https://soc-analyst-hub.pages.dev/articles/detecting-malicious-powershell-execution/</guid><description>PowerShell remains one of the most abused tools in the attacker&apos;s arsenal. This guide covers the full detection stack — script block logging, module logging, transcription, AMSI, and Sigma rules for hunting obfuscated and encoded commands.</description><pubDate>Fri, 22 May 2026 00:00:00 GMT</pubDate><category>detection-guide</category><category>powershell</category><category>script-block-logging</category><category>amsi</category><category>sigma</category><category>windows</category><category>T1059.001</category><category>obfuscation</category><category>living-off-the-land</category></item><item><title>Hunting Living-Off-the-Land Binaries: certutil, mshta, regsvr32, and wscript</title><link>https://soc-analyst-hub.pages.dev/articles/hunting-living-off-the-land-binaries-lolbins/</link><guid isPermaLink="true">https://soc-analyst-hub.pages.dev/articles/hunting-living-off-the-land-binaries-lolbins/</guid><description>A threat hunt playbook for detecting LOLBin abuse — adversaries using native Windows binaries to execute payloads, download files, and evade detection. Covers certutil, mshta, regsvr32, and wscript with Sigma rules and hunting queries.</description><pubDate>Fri, 28 Nov 2025 00:00:00 GMT</pubDate><category>hunt-playbook</category><category>lolbins</category><category>defense-evasion</category><category>execution</category><category>sigma</category><category>certutil</category><category>mshta</category></item><item><title>Velociraptor for Endpoint Threat Hunting: A Practical Guide</title><link>https://soc-analyst-hub.pages.dev/articles/velociraptor-threat-hunting-endpoints/</link><guid isPermaLink="true">https://soc-analyst-hub.pages.dev/articles/velociraptor-threat-hunting-endpoints/</guid><description>A hands-on review of Velociraptor for endpoint threat hunting. Covers VQL query language basics, artifact collection, live response, and building custom hunt artifacts for large environments.</description><pubDate>Tue, 18 Nov 2025 00:00:00 GMT</pubDate><category>tool-review</category><category>velociraptor</category><category>dfir</category><category>endpoint</category><category>vql</category><category>threat-hunting</category><category>dfir-tools</category></item><item><title>Detecting C2 Beaconing and DNS Tunneling with Frequency Analysis</title><link>https://soc-analyst-hub.pages.dev/articles/detecting-c2-beaconing-dns-tunneling/</link><guid isPermaLink="true">https://soc-analyst-hub.pages.dev/articles/detecting-c2-beaconing-dns-tunneling/</guid><description>A deep dive into C2 beaconing detection using statistical analysis of connection timing and DNS query patterns. Learn how to identify beacon sleep intervals, jitter patterns, and DNS exfiltration using log-based analytics.</description><pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate><category>detection-guide</category><category>c2</category><category>dns-tunneling</category><category>beaconing</category><category>network-detection</category><category>threat-hunting</category></item><item><title>Writing Sigma Rules from Scratch: A Practical Guide</title><link>https://soc-analyst-hub.pages.dev/articles/sigma-rule-writing-guide-beginners/</link><guid isPermaLink="true">https://soc-analyst-hub.pages.dev/articles/sigma-rule-writing-guide-beginners/</guid><description>Learn to write detection rules in Sigma — the vendor-neutral rule format for SIEM detections. Covers logsource types, condition syntax, field mappings, and how to test and tune rules before deploying.</description><pubDate>Sat, 01 Nov 2025 00:00:00 GMT</pubDate><category>detection-guide</category><category>sigma</category><category>detection-engineering</category><category>siem</category><category>rule-writing</category></item><item><title>Threat Hunting Lateral Movement via SMB, PsExec, and WMI</title><link>https://soc-analyst-hub.pages.dev/articles/threat-hunting-lateral-movement-smb/</link><guid isPermaLink="true">https://soc-analyst-hub.pages.dev/articles/threat-hunting-lateral-movement-smb/</guid><description>A structured threat hunt playbook for identifying lateral movement activity using SMB-based tooling. Covers PsExec, Impacket, WMI execution, and the network and host artifacts each leaves behind.</description><pubDate>Wed, 22 Oct 2025 00:00:00 GMT</pubDate><category>hunt-playbook</category><category>lateral-movement</category><category>psexec</category><category>wmi</category><category>smb</category><category>impacket</category></item><item><title>Detecting LSASS Credential Dumping on Windows</title><link>https://soc-analyst-hub.pages.dev/articles/detecting-lsass-credential-dumping-windows/</link><guid isPermaLink="true">https://soc-analyst-hub.pages.dev/articles/detecting-lsass-credential-dumping-windows/</guid><description>A practical detection guide for identifying Mimikatz, procdump, and other tools targeting LSASS memory. Covers Sysmon events, Windows Security logs, and Sigma rules you can deploy today.</description><pubDate>Wed, 15 Oct 2025 00:00:00 GMT</pubDate><category>detection-guide</category><category>credential-access</category><category>mimikatz</category><category>lsass</category><category>sysmon</category><category>sigma</category></item></channel></rss>