Make your threat hunting process more efficient by integrating MISP and CrowdStrike Falcon EDR so you can automate uploading your IOCs for detection.
Learn how to create a Jupyter Notebook that you can use to query your MISP instance. This will drastically speed up your threat intelligence operations!
Discover what Jupyter Notebooks are and learn how to create your own to structure your threat hunting workflow and improve your efficiency.
Learn to create your own Python packages using the Python module Poetry. This lets you easily share your threat hunting tools with the community.
Discover how to extract valuable information from JSON to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.
Discover how to extract data from a CSV file to analyze it and turn it into threat intelligence or IOCs to hunt for in your environment.
Discover how to create standalone executable programs from your Python scripts that you can use on any Windows operating system using the Python module py2exe.
Learn how to give your threat hunting tools command line arguments that modify their behavior when they are executed.
Learn to use browser automation to automate the threat intelligence process when API access is not available or behind a paywall.
Welcome back to this series on building threat hunting tools! Today how interacting with APIs can help us threat hunt.
Learn about web scraping and to create your own tool to scrape threat intelligence from CISA's weekly vulnerability summary.
Learn how to build your own threat hunting tools with Python in this new series! First, let’s find out why it is important to build your own tools.