Homepage
Open in app
Sign in
Get started
threatpunter
Detection & Response Engineering • Threat Hunting • Threat Research
Follow
Latest
Trending
David French
in
threatpunter
Jul 27, 2023
From soup to nuts: Building a Detection-as-Code pipeline
Part 1 of 2
Read more…
87
2 responses
David French
in
threatpunter
Jul 27, 2023
From soup to nuts: Building a Detection-as-Code pipeline
Part 2 of 2
Read more…
20
1 response
David French
in
threatpunter
Sep 30, 2018
Detecting Lateral Movement Using Sysmon and Splunk
Read more…
62
2 responses
David French
in
threatpunter
Oct 1, 2018
How to Setup “Cowrie” — An SSH Honeypot
Cowrie is a medium interaction SSH and Telnet honeypot, which can log brute force attacks…
Read more…
18
1 response
David French
in
threatpunter
Oct 2, 2018
Detecting Attempts to Steal Passwords from Memory
Read more…
62
David French
in
threatpunter
Oct 9, 2018
Detecting & Removing WMI Persistence
Windows Management Instrumentation (WMI) Event Subscription is a…
Read more…
80
1 response
David French
in
threatpunter
Jul 12, 2022
Threat hunting in Okta logs
Threat hunting tips to help blue teams defend their Okta Single Sign-On…
Read more…
27
2 responses
David French
in
threatpunter
Oct 2, 2018
Detecting Attempts to Steal Passwords from the Registry
Read more…
9
David French
in
threatpunter
Aug 16, 2019
Detecting Adversary Tradecraft with Image Load Event Logging and EQL
Read more…
49
1 response
David French
in
threatpunter
Dec 14, 2020
Testing your Okta visibility and detection with Dorothy and Elastic Security
Read more…
1 response
About
threatpunter
Detection & Response Engineering • Threat Hunting • Threat Research
More information
Followers
366
Elsewhere