A network threat hunting reference covering eight MITRE ATT&CK tactics across the intrusion lifecycle. Every indicator includes paste-ready query syntax for Arkime, Kibana (KQL), and Suricata, plus operational notes and APT attribution context.
Built for analysis and threat hunting in offline environments.
$INTERNAL, $DOMAIN_CONTROLLERS, and $ADMIN_HOSTS in queries are placeholders — replace them with values from your environment before running.
Starred indicators persist across browser restarts and sync across open tabs in real-time. Hunts are stored in localStorage under the key hunt_reference_hunts_v1 - nothing leaves the browser.
Each export comes pre-formatted as a CMS-ready hunt package with timestamps, technique IDs, query syntax, and notes.
Ordering is chronological so the export reads as a hunt timeline.