Custom tools are computer programs or scripts that you create to fill a specific niche, automate a repetitive task, or help you solve a complex problem.
Discover how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code (IaC).
Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, and map your attack surface.
Learn why malware configuration parsing is an essential skill for any threat hunter, plus how to use a malware configuration parsers to do this automatically.
Learn about MITRE’s CTI Blueprints project. A revolutionary new CTI project that aims to help analysts deliver high-quality, standardized CTI reports.
Discover the new cyber security notetaking app that integrates with your organization’s tools and is an effective copilot for all your investigations.
Make your threat hunting process more efficient by integrating MISP and CrowdStrike Falcon EDR so you can automate uploading your IOCs for detection.
Learn how to create a Jupyter Notebook that you can use to query your MISP instance. This will drastically speed up your threat intelligence operations!
Learn what a CTI aggregator is, why you need one, and how to create your own for completely for free to make your threat intelligence gathering efficient
Learn the key components of incident response playbooks, how to create your own, and the best implementation practices to get them enterprise ready.
Learn 5 ways to use AI and ChatGPT to create custom tools that you can use in your day-to-day work to improve your organization’s cyber security posture.
Discover what Jupyter Notebooks are and learn how to create your own to structure your threat hunting workflow and improve your efficiency.
Learn to create your own Python packages using the Python module Poetry. This lets you easily share your threat hunting tools with the community.
Discover how to extract valuable information from JSON to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.
Discover how to extract data from a CSV file to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.
Discover how to create standalone executable programs from your Python scripts that you can use on any Windows operating system using the Python module py2exe.