InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 11 — A Jupyter Notebook for MISPLearn how to create a Jupyter Notebook using Python to interact with your MISP instance and drastically speed up your CTI operations!Nov 6, 2023A response icon1Nov 6, 2023A response icon1
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 10 — The Power of Jupyter NotebooksLearn about the power of Jupyter Noteboks and how to integrate your Python threat hunting tools!Jul 7, 2023Jul 7, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 9 — Creating Python Packages with PoetryDiscover how to create Python packages with Poetry so others can easily integrate your hunting tools into their projects!Jun 30, 2023A response icon1Jun 30, 2023A response icon1
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 8 — Parsing JSONLet’s learn how to extract valuable threat intelligence from JSON using Python! A handy skill for when interacting with web APIs.Jun 19, 2023Jun 19, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 7 — Parsing CSVLet’s take a look at how we can parse CSV files to extract useful threat intelligence, then turn this into a threat hunting tool!Jun 12, 2023A response icon1Jun 12, 2023A response icon1
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 6 — Creating EXEs from Python FilesLearn how to turn your fragile Python scripts into versitile threat hunting executable tools.Jun 5, 2023A response icon1Jun 5, 2023A response icon1
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 5 — Command Line ArgumentsLearn how to expand your Python scripts by using command line arguments!May 31, 2023May 31, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 4 — Browser AutomationLet’s learn to use browser automation to scale our threat hunting capabilities!May 22, 2023May 22, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 3 — Interacting with APIsWelcome back to this series on building threat hunting tools! Today how interacting with APIs can help us threat hunt.May 15, 2023A response icon1May 15, 2023A response icon1
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 2 — Web ScrapingWelcome back to this series on building threat hunting tools! Let’s dive into web scraping and create a tool to gather threat intelligence.May 8, 2023May 8, 2023
Adam GossPython Threat Hunting Tools: Part 1 — Why?Learn how to build your own threat hunting tools with Python! First, let’s find out why this is important.May 1, 2023May 1, 2023