Introducing Hunt Advanced Search

Published on

Published on

Published on

Jan 30, 2024

Jan 30, 2024

Jan 30, 2024

Introducing Hunt Advanced Search
Introducing Hunt Advanced Search
Introducing Hunt Advanced Search
Introducing Hunt Advanced Search

Introducing Hunt Advanced Search

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with more questions than when you started?

Today, we are happy to introduce the Advanced Search feature for Hunt.

Designed with an easy-to-use language to specifically query the data Hunt scans, researchers and threat hunters alike can discover hidden gems in open directories, track well-known frameworks used for initial access, or search for one-of-a-kind TLS certificates; Advanced Search is key to unlocking the secrets of the internet.

Let's Get Started: Query Syntax & Examples

Advanced Search focuses on three categories when searching data: Malware, Certificates, and Opendir files. Each category has a data schema and example values, allowing users to immediately experience the tool's power.

The below figure depicts what users see when navigating to the Advanced Search page.

httpshuntioimagesblogsblog-12img-1-2xwebpFigure 1: Advanced Search Page

For reference, let's cover a few of the more common queries along with a screenshot from each category threat hunters are likely to use throughout an investigation:

Searching for newly identified Quasar RAT infrastructure

  • Query: malware_name:"Quasar"

httpshuntioimagesblogsblog-12img-2-2xwebpFigure 2: Snippet of query results for Quasar infrastructure

Notice that, like any other modern query language, we can combine queries for a more comprehensive result.

Using the "AND" operator in addition to "seen_last," we can filter our results to only those scanned in the last 7 days.

TLS certificate subject common name default Cobalt Strike

  • subject.common_name:"

httpshuntioimagesblogsblog-12img-3-2xwebpFigure 3: Snippet of query results for default Cobalt Strike certificate common name

Presence of Fast Reverse Proxy configuration files on open directories

  • file_key://frpc.ini$/ AND modified:>now-30d

httpshuntioimagesblogsblog-12img-4-2xwebpFigure 4: Snipped of query results for FRP config files

Enough of the example queries; let's dig into some real-world examples and put Advanced Search to the test!

JA4X & Sliver

This first example will combine the power of John Althouse's JA4+ fingerprinting suite, specifically JA4X ( https://github.com/FoxIO-LLC/ja4 ), with Hunt's ability to search across subject and issuer information from TLS certificates.

httpshuntioimagesblogsblog-12img-5-2xwebpFigure 5: Snippet of query results for Sliver certificates.

The query in the screenshot above searches for certificates matching the JA4X hash but does not use the default subject or issuer common names hardcoded into the Sliver framework.

Cobalt Strike Redirector

RedWarden (https://github.com/mgeeky/RedWarden), is an open-source Cobalt Strike C2 reverse proxy meant to throw researchers off the scent of adversary infrastructure.

Let's find some recent instances of RedWarden hosted on DigitalOcean.

httpshuntioimagesblogsblog-12img-6-2xwebpFigure 6: Snippet of query results for RedWarden on Digital Ocean infrastructure

OpenDirs & CVE's

Past Hunt blog articles have focused on just how important open directories can be to cyber threat hunting and incident response.

In addition to the large number of executables, log and configuration files and whatever else is exposed, many open directories also host exploit code for common vulnerabilities and exposures (CVE), past and present.

See the below screenshot for exploit code identified by Hunt in open directories across the past 7 days.

httpshuntioimagesblogsblog-12img-7-2xwebpFigure 7: Snippet of query results for opendir exploit code

Conclusion

We've only scratched the surface of what is capable when using Advanced Search. In just a line or two, researchers, threat hunters, and the curious can identify malicious infrastructure first seen a couple minutes ago, or track the steps of an adversaries infrastructure from a few months ago.

If you haven't already, apply for a Hunt account, and if you find something interesting share your query with the community.

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with more questions than when you started?

Today, we are happy to introduce the Advanced Search feature for Hunt.

Designed with an easy-to-use language to specifically query the data Hunt scans, researchers and threat hunters alike can discover hidden gems in open directories, track well-known frameworks used for initial access, or search for one-of-a-kind TLS certificates; Advanced Search is key to unlocking the secrets of the internet.

Let's Get Started: Query Syntax & Examples

Advanced Search focuses on three categories when searching data: Malware, Certificates, and Opendir files. Each category has a data schema and example values, allowing users to immediately experience the tool's power.

The below figure depicts what users see when navigating to the Advanced Search page.

httpshuntioimagesblogsblog-12img-1-2xwebpFigure 1: Advanced Search Page

For reference, let's cover a few of the more common queries along with a screenshot from each category threat hunters are likely to use throughout an investigation:

Searching for newly identified Quasar RAT infrastructure

  • Query: malware_name:"Quasar"

httpshuntioimagesblogsblog-12img-2-2xwebpFigure 2: Snippet of query results for Quasar infrastructure

Notice that, like any other modern query language, we can combine queries for a more comprehensive result.

Using the "AND" operator in addition to "seen_last," we can filter our results to only those scanned in the last 7 days.

TLS certificate subject common name default Cobalt Strike

  • subject.common_name:"

httpshuntioimagesblogsblog-12img-3-2xwebpFigure 3: Snippet of query results for default Cobalt Strike certificate common name

Presence of Fast Reverse Proxy configuration files on open directories

  • file_key://frpc.ini$/ AND modified:>now-30d

httpshuntioimagesblogsblog-12img-4-2xwebpFigure 4: Snipped of query results for FRP config files

Enough of the example queries; let's dig into some real-world examples and put Advanced Search to the test!

JA4X & Sliver

This first example will combine the power of John Althouse's JA4+ fingerprinting suite, specifically JA4X ( https://github.com/FoxIO-LLC/ja4 ), with Hunt's ability to search across subject and issuer information from TLS certificates.

httpshuntioimagesblogsblog-12img-5-2xwebpFigure 5: Snippet of query results for Sliver certificates.

The query in the screenshot above searches for certificates matching the JA4X hash but does not use the default subject or issuer common names hardcoded into the Sliver framework.

Cobalt Strike Redirector

RedWarden (https://github.com/mgeeky/RedWarden), is an open-source Cobalt Strike C2 reverse proxy meant to throw researchers off the scent of adversary infrastructure.

Let's find some recent instances of RedWarden hosted on DigitalOcean.

httpshuntioimagesblogsblog-12img-6-2xwebpFigure 6: Snippet of query results for RedWarden on Digital Ocean infrastructure

OpenDirs & CVE's

Past Hunt blog articles have focused on just how important open directories can be to cyber threat hunting and incident response.

In addition to the large number of executables, log and configuration files and whatever else is exposed, many open directories also host exploit code for common vulnerabilities and exposures (CVE), past and present.

See the below screenshot for exploit code identified by Hunt in open directories across the past 7 days.

httpshuntioimagesblogsblog-12img-7-2xwebpFigure 7: Snippet of query results for opendir exploit code

Conclusion

We've only scratched the surface of what is capable when using Advanced Search. In just a line or two, researchers, threat hunters, and the curious can identify malicious infrastructure first seen a couple minutes ago, or track the steps of an adversaries infrastructure from a few months ago.

If you haven't already, apply for a Hunt account, and if you find something interesting share your query with the community.

Related Posts:

ClickFix Facebook Session Hijacking Campaign Targets Creators at Scale
Jan 21, 2026

An in-depth analysis of a ClickFix phishing campaign hijacking Facebook sessions at scale. Learn how attackers abuse verification workflows, steal session cookies, bypass MFA, and target creators using cloud-hosted infrastructure.

ClickFix Facebook Session Hijacking Campaign Targets Creators at Scale
Jan 21, 2026

An in-depth analysis of a ClickFix phishing campaign hijacking Facebook sessions at scale. Learn how attackers abuse verification workflows, steal session cookies, bypass MFA, and target creators using cloud-hosted infrastructure.

Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs
Jan 14, 2026

Discover how we mapped over 18,000 active malware C2 servers across Chinese ISPs and cloud providers using host-centric telemetry. See which providers are most frequently abused and what it means for global threat monitoring.

Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs
Jan 14, 2026

Discover how we mapped over 18,000 active malware C2 servers across Chinese ISPs and cloud providers using host-centric telemetry. See which providers are most frequently abused and what it means for global threat monitoring.

The Complete Guide to Hunting Cobalt Strike - Part 3: Automated C2 Infrastructure Discovery
Jan 6, 2026

See how automated detection, certificate analysis, and structured queries map Cobalt Strike C2 clusters and expose long-running infrastructure. Learn more.

The Complete Guide to Hunting Cobalt Strike - Part 3: Automated C2 Infrastructure Discovery
Jan 6, 2026

See how automated detection, certificate analysis, and structured queries map Cobalt Strike C2 clusters and expose long-running infrastructure. Learn more.

2025 Year in Review: Hunt.io Product Updates and Threat Research
Dec 23, 2025

A look back at Hunt.io’s 2025 product releases, platform scale, and the threat research our community engaged with most throughout the year.

2025 Year in Review: Hunt.io Product Updates and Threat Research
Dec 23, 2025

A look back at Hunt.io’s 2025 product releases, platform scale, and the threat research our community engaged with most throughout the year.

ClickFix Facebook Session Hijacking Campaign Targets Creators at Scale
Jan 21, 2026

An in-depth analysis of a ClickFix phishing campaign hijacking Facebook sessions at scale. Learn how attackers abuse verification workflows, steal session cookies, bypass MFA, and target creators using cloud-hosted infrastructure.

Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs
Jan 14, 2026

Discover how we mapped over 18,000 active malware C2 servers across Chinese ISPs and cloud providers using host-centric telemetry. See which providers are most frequently abused and what it means for global threat monitoring.