├── Labs ├── Splunk & ELK.md └── Volatility.md ├── README.md ├── Section1 ├── Module1 │ └── Intro to Threat Hunting.md ├── Module2 │ └── Threat Hunting Professional.md ├── Module3 │ └── Threat Intelligence.md ├── Module4 │ └── Threat Hunting Hypothesis.md └── ⠀⠀ ├── Section2 ├── Module1 │ └── Intro To Network Hunting.md ├── Module2 │ └── suspicious Traffic Hunting.md ├── Module3 │ └── Hunting Web shell.md └── ⠀⠀ └── Section3 ├── Module1 └── Introduction To Endpoint Hunting.md ├── Module2 └── Malware Overview.md ├── Module3 └── Hunting Malware.md ├── Module4 └── Event IDs, Logging, & SIEMs.md └── ⠀ /Labs/Splunk & ELK.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Labs/Splunk & ELK.md -------------------------------------------------------------------------------- /Labs/Volatility.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Labs/Volatility.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/README.md -------------------------------------------------------------------------------- /Section1/Module1/Intro to Threat Hunting.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section1/Module1/Intro to Threat Hunting.md -------------------------------------------------------------------------------- /Section1/Module2/Threat Hunting Professional.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section1/Module2/Threat Hunting Professional.md -------------------------------------------------------------------------------- /Section1/Module3/Threat Intelligence.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section1/Module3/Threat Intelligence.md -------------------------------------------------------------------------------- /Section1/Module4/Threat Hunting Hypothesis.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section1/Module4/Threat Hunting Hypothesis.md -------------------------------------------------------------------------------- /Section1/⠀⠀: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /Section2/Module1/Intro To Network Hunting.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section2/Module1/Intro To Network Hunting.md -------------------------------------------------------------------------------- /Section2/Module2/suspicious Traffic Hunting.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section2/Module2/suspicious Traffic Hunting.md -------------------------------------------------------------------------------- /Section2/Module3/Hunting Web shell.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section2/Module3/Hunting Web shell.md -------------------------------------------------------------------------------- /Section2/⠀⠀: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /Section3/Module1/Introduction To Endpoint Hunting.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section3/Module1/Introduction To Endpoint Hunting.md -------------------------------------------------------------------------------- /Section3/Module2/Malware Overview.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section3/Module2/Malware Overview.md -------------------------------------------------------------------------------- /Section3/Module3/Hunting Malware.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section3/Module3/Hunting Malware.md -------------------------------------------------------------------------------- /Section3/Module4/Event IDs, Logging, & SIEMs.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cyber6l/eCTHP-Notes/HEAD/Section3/Module4/Event IDs, Logging, & SIEMs.md -------------------------------------------------------------------------------- /Section3/⠀: -------------------------------------------------------------------------------- 1 | 2 | --------------------------------------------------------------------------------