Custom tools are computer programs or scripts that you create to fill a specific niche, automate a repetitive task, or help you solve a complex problem.
In this complete guide, learn how to create your own custom web scraping tool to gather cyber threat intelligence using the no-code platform Octoparse.
Discover how to create your own automated malware analysis environment you can deploy in minutes by combining powerful technologies in this hands-on guide.
Discover how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code (IaC).
Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, and map your attack surface.
Learn why malware configuration parsing is an essential skill for any threat hunter, plus how to use a malware configuration parsers to do this automatically.
Learn about MITRE’s CTI Blueprints project. A revolutionary new CTI project that aims to help analysts deliver high-quality, standardized CTI reports.
Discover the new cyber security notetaking app that integrates with your organization’s tools and is an effective copilot for all your investigations.
Make your threat hunting process more efficient by integrating MISP and CrowdStrike Falcon EDR so you can automate uploading your IOCs for detection.
Learn how to create a Jupyter Notebook that you can use to query your MISP instance. This will drastically speed up your threat intelligence operations!
Learn what a CTI aggregator is, why you need one, and how to create your own for completely for free to make your threat intelligence gathering efficient
Learn the key components of incident response playbooks, how to create your own, and the best implementation practices to get them enterprise ready.
Learn 5 ways to use AI and ChatGPT to create custom tools that you can use in your day-to-day work to improve your organization’s cyber security posture.
Discover what Jupyter Notebooks are and learn how to create your own to structure your threat hunting workflow and improve your efficiency.
Learn to create your own Python packages using the Python module Poetry. This lets you easily share your threat hunting tools with the community.
Discover how to extract valuable information from JSON to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.