Translate detection queries between Splunk, Sentinel, and Elastic. Includes common hunt patterns and field mappings for quick reference.
CONVERT QUERIES >>
Windows Event IDs, Sysmon events, common ports, regex patterns, PowerShell commands, and Linux log locations. Essential reference for threat hunters.
VIEW CHEAT SHEETS >>
Step-by-step incident response procedures for ransomware, phishing, data breaches, malware outbreaks, and more. Field-tested methodologies.
ACCESS PLAYBOOKS >>
Curated collection of threat hunting tools, scripts, and utilities. From osquery to Velociraptor, HELK to Sigma rules.
ACCESS TOOLS >>
Structured learning paths from beginner to advanced threat hunter. Labs, challenges, and real-world scenarios to build your skills.
START LEARNING >>