https://threathunterplaybook.com/tutorials/jupyter/introduction.html
https://github.com/Cyb3rWard0g/HELK
https://www.threathunting.net/sqrrl-archive
https://github.com/PacktPublishing/Threat-Hunting-with-Elastic-Stack
https://www.dropbox.com/s/05d2orn055pduql/B17089_Threat Hunting with Elastic Stack_eBook.pdf?dl=0 https://www.elastic.co/guide/en/security/8.3/prebuilt-rules.html
https://www.linode.com/docs/guides/security/vulnerabilities/
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/index
https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
https://www.dropbox.com/sh/5z57xqgpm4boglq/AACYuyFfXQ9KktQCMM05INM8a?dl=0
https://www.dropbox.com/sh/yt2pduld3yc28ce/AADZm-Jf0ViAF6d6aoad211Za?dl=0
https://www.dropbox.com/sh/5z57xqgpm4boglq/AACYuyFfXQ9KktQCMM05INM8a?dl=0
https://www.dropbox.com/sh/yt2pduld3yc28ce/AADZm-Jf0ViAF6d6aoad211Za?dl=0