๐ŸŽฃ

Threat Hunter's Cookbook

Enter your server token to connect

Invalid token. Please check and try again.

Stored in session only ยท Never sent externally

๐ŸŽฃ
Threat Hunter's
Cookbook
Built on PEAK Framework
Threat Analyzer
Enter a CVE, malware name, threat actor, or paste threat intel to generate Splunk hunting queries
Try:
๐Ÿ”’ Only public threat intelligence is used. No internal data is ever sent to AI. All SPL are templates requiring analyst review.
๐ŸŽฏ
Ready to Hunt
Enter a threat above to generate hunting queries, threat intelligence, and technical analysis
Analysing threat intelligence...
Generating SPL queries and threat summary

Type
First Seen
Threat Actors
Affected Systems
Overview

MITRE ATT&CK Coverage
Tactics
Techniques
โš ๏ธ Template queries only. Adapt index names, sourcetypes, and field names to your Splunk environment before running.
How It Works

Attack Chain
Key Observable Behaviours
โš ๏ธ IOCs from public threat intelligence only. Verify before operationalising.
SPL Builder
Build Splunk hunting queries using Threat Hunter's Cookbook methods
Optional: add specific field=value conditions
โš—๏ธ
SPL Builder
Fill in the form and click Generate to build a Splunk hunting query
Building SPL query...
Generated SPL
โš ๏ธ Template Only
Method Rationale

Query Breakdown
โœ… True Positive Indicators
    โš ๏ธ False Positive Considerations
      ๐Ÿ”ง Tuning Tips
        ๐Ÿ”— Related Hunts
          The Cookbook
          Quick reference for all seven Threat Hunter's Cookbook methods