Threat Hunting & Open Research (THOR)

Welcome to the Project that breaks down & explores the realms of Cyber Threat Hunting.

Whoami.exe

Saksham Tushar

  • Information security professional, worked in multiple global SOCs

  • Worked on building Threat-Hunting programs and turn them into BAU for multiple high profile clients & companies as part of my career.

  • Deployed Threat-Hunter on the cloud.

  • Security analytics enthusiast.

  • Loves coffee and automation

$ With great powers comes greater responsibility.

My Profile References :

Mail me at : sakshamtushar@gmail.com

Systeminfo.exe

Why build this project/Documentation/blog/data repository?

Restriction Free Setup to Enable myself Study and Learn: Threat Hunting is a mythical Subject, Different teams do it differently and that's the beauty of it, but what doesn't change is the nature of the Same sample threat that is hunted, No matter what EDR/Security platform you use for Hunting, ZEUS malware will behave independently of your security stack, Until and unless you have next-gen polymorphic customized malware code in your environment. Since I don't have enough resources and Financial Support to buy an enterprise EDR to study behaviors of Malwares. This project is an attempt to build something from open source technologies(a huge shout out to the open-source community for building and contributing Great Projects to enable people like me to independently research and study the latest Security samples and threats.)

Last updated