Links2023-05-27·63 words·1 min· loading AuthorRichey WardThreat Hunter, Reverse Engineer, CTFer Table of ContentsIncident ResponseThreat HuntingDFIR - Host CollectionThreat IntelAdversary EmulationInsider ThreatTable of ContentsIncident ResponseThreat HuntingDFIR - Host CollectionThreat IntelAdversary EmulationInsider ThreatIncident Response#Awesome Incident ResponseIR PlaybooksThreat Hunting#Hunting Queries & Detection RulesFinding Bad - DFIR and Threat HuntingDFIR - Host Collection#Bert Jan - IR PowershellDigital Forensics Artifacts RepositoryThreat Intel#CTI BlueprintsAdversary Emulation#BishopFox - SilverInsider Threat#Microsoft - MS Cloud App Security - The Hunt for Insider Risks