Threat Analyzer
Enter a CVE, malware name, threat actor, or paste threat intel to generate Splunk hunting queries
Try:
๐ Only public threat intelligence is used. No internal data is ever sent to AI. All SPL are templates requiring analyst review.
Ready to Hunt
Enter a threat above to generate hunting queries, threat intelligence, and technical analysis
Type
First Seen
Threat Actors
Affected Systems
Overview
MITRE ATT&CK Coverage
Tactics
Techniques
โ ๏ธ Template queries only. Adapt index names, sourcetypes, and field names to your Splunk environment before running.
How It Works
Attack Chain
Key Observable Behaviours
โ ๏ธ IOCs from public threat intelligence only. Verify before operationalising.