Threat Intelligence Guides
Practical Examples of URL Hunting Queries - Part 1
Practical examples of URL hunting queries.
Threat Intelligence Guides
Practical examples of URL hunting queries.
Threat Intelligence Guides
Tracking APT SideWinder Domains With Regular Expressions, Whois Records and Domain Registrars
Threat Intelligence Guides
Tracking Malware Infrastructure Through Subdomain Analysis
Threat Intelligence Guides
Identifying malicious infrastructure through hardcoded TLS Certificates and Subdomains.
Threat Intelligence Guides
Finding phishing domains passive DNS tooling and 302 redirects.
Threat Intelligence Guides
Leveraging Passive DNS to identify APT infrastructure. Building on public intelligence reports.
Threat Intelligence Guides
Malware Infrastructure Tracking Using Passive DNS Intelligence.
Threat Intelligence Guides
Identifying malware infrastructure with the FOFA scanner.
Threat Intelligence Guides
Catching 83 Qakbot Servers using Regular Expressions.
Threat Intelligence Guides
Creating Regex Signatures on TLS Certificates with Censys.
Threat Intelligence Guides
Refining Queries and Identifying Suspicious servers using Censys.
Threat Intelligence Guides
More interesting and practical queries for identifying malware infrastructure.