https://threathunterplaybook.com/tutorials/jupyter/introduction.html

https://github.com/Cyb3rWard0g/HELK

https://www.threathunting.net/sqrrl-archive

https://github.com/PacktPublishing/Threat-Hunting-with-Elastic-Stack

https://www.dropbox.com/s/05d2orn055pduql/B17089_Threat Hunting with Elastic Stack_eBook.pdf?dl=0 https://www.elastic.co/guide/en/security/8.3/prebuilt-rules.html

https://www.linode.com/docs/guides/security/vulnerabilities/

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/index

https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon

https://www.dropbox.com/sh/5z57xqgpm4boglq/AACYuyFfXQ9KktQCMM05INM8a?dl=0

https://www.dropbox.com/sh/yt2pduld3yc28ce/AADZm-Jf0ViAF6d6aoad211Za?dl=0

https://www.dropbox.com/sh/5z57xqgpm4boglq/AACYuyFfXQ9KktQCMM05INM8a?dl=0

https://www.dropbox.com/sh/yt2pduld3yc28ce/AADZm-Jf0ViAF6d6aoad211Za?dl=0