InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 11 — A Jupyter Notebook for MISPLearn how to create a Jupyter Notebook using Python to interact with your MISP instance and drastically speed up your CTI operations!Nov 6, 20231Nov 6, 20231
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 10 — The Power of Jupyter NotebooksLearn about the power of Jupyter Noteboks and how to integrate your Python threat hunting tools!Jul 7, 2023Jul 7, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 9 — Creating Python Packages with PoetryDiscover how to create Python packages with Poetry so others can easily integrate your hunting tools into their projects!Jun 30, 2023Jun 30, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 8 — Parsing JSONLet’s learn how to extract valuable threat intelligence from JSON using Python! A handy skill for when interacting with web APIs.Jun 19, 2023Jun 19, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 7 — Parsing CSVLet’s take a look at how we can parse CSV files to extract useful threat intelligence, then turn this into a threat hunting tool!Jun 12, 2023Jun 12, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 6 — Creating EXEs from Python FilesLearn how to turn your fragile Python scripts into versitile threat hunting executable tools.Jun 5, 2023Jun 5, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 5 — Command Line ArgumentsLearn how to expand your Python scripts by using command line arguments!May 31, 2023May 31, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 4 — Browser AutomationLet’s learn to use browser automation to scale our threat hunting capabilities!May 22, 2023May 22, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 3 — Interacting with APIsWelcome back to this series on building threat hunting tools! Today how interacting with APIs can help us threat hunt.May 15, 2023May 15, 2023
InInfoSec Write-upsbyAdam GossPython Threat Hunting Tools: Part 2 — Web ScrapingWelcome back to this series on building threat hunting tools! Let’s dive into web scraping and create a tool to gather threat intelligence.May 8, 2023May 8, 2023
Adam GossPython Threat Hunting Tools: Part 1 — Why?Learn how to build your own threat hunting tools with Python! First, let’s find out why this is important.May 1, 2023May 1, 2023