Python Threat Hunting Tools Part 7 — Parsing CSV
Discover how to extract data from a CSV file to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.
The Kraven Security blog is the ultimate resource for free content on cyber threat intelligence, threat hunting, and custom tooling. We drop new articles every week with tips, advice, and guided tutorials. Don't miss a thing and signup to get notified of new content.
You have successfully joined our subscriber list.
Discover how to extract data from a CSV file to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.
Ever wondered what KFC and threat intelligence have in common? Discover how relevance, timeliness, and actionability relate good threat intelligence.
Discover how to create standalone executable programs from your Python scripts that you can use on any Windows operating system using the Python module py2exe.
Learn how to give your threat hunting tools command line arguments that modify their behavior when they are executed.
Find out how to be a stand out in the cyber security industry and reach the legendary status of a cyber security unicorn by mastering diverse skills.
Learn to use browser automation to automate the threat intelligence process when API access is not available or behind a paywall.
Discover 10 practical ways you can take advantage of the AI takeover and use ChatGPT to help you perform threat hunting and enhance your capabilities.
Welcome back to this series on building threat hunting tools! Today how interacting with APIs can help us threat hunt.
Find out 5 reasons why a threat intelligence platform will improve your business and help your security operations tackle the latest emerging threats.
Learn about web scraping and to create your own tool to scrape threat intelligence from CISA’s weekly vulnerability summary.
Discover how to integrate your cyber threat intelligence with your threat hunting tasks to create the perfect pipeline and streamline your operations.
Learn how to build your own threat hunting tools with Python in this new series! First, let’s find out why it is important to build your own tools.
Training is vital for success in cybersecurity. Let’s explore the options you have at your disposal and perhaps the best path to follow to achieve your goals.
Learn how attackers use the Windows Startup Folder to maintain persistence once they’ve compromised a machine. Then hunt for these malicious Startup Folder items.
Discover how to create your own custom Sigma rules to hunt for the latest threats that are affecting your environment and thwart threat actors.