A Splunk application containing several dashboards and over 130 reports that facilitate initial hunting indicators to investigate. Requires ingesting Sysmon data into Splunk and tuning for effectiveness. Maps searches to the MITRE ATT&CK framework.
Common questions about ThreatHunting including features, pricing, alternatives, and user reviews.
ThreatHunting is A Splunk app mapped to MITRE ATT&CK to guide threat hunts. It is a Security Operations solution designed to help security teams with MITRE Attack, Splunk, Sysmon.
ThreatHunting is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/olafhartong/ThreatHunting/ for download and installation instructions.
Popular alternatives to ThreatHunting include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
ThreatHunting is for security teams and organizations that need MITRE Attack, Splunk, Sysmon. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel