Learn how to use Velociraptor’s threat hunting capabilities to identify malicious activity associated with real-world malware and threat actors in this demo.
Discover how to create a virtualized threat hunting environment and use Velociraptor as a threat hunting tool to sniff out malicious reverse shells.
Learn what threats are, what threat hunting is, and the basic security requirements needed to start a threat hunting program in this series introduction.