HuntSQL™

HuntSQL™

HuntSQL™

HuntSQL™

This allows researchers, analysts, and threat hunters to query the extensive Hunt database using the power and flexibility of SQL.

This allows researchers, analysts, and threat hunters to query the extensive Hunt database using the power and flexibility of SQL.

HuntSQL™ - SQL-Driven Threat Hunting

Features

Features

HTTP

HTTP

Users can query first-party HTTP data to identify threat actors and malicious activity.

Users can query first-party HTTP data to identify threat actors and malicious activity.

Malware

Malware

Users can query the Hunt database of confirmed C2 servers and build detailed statistics on threat actor activity.

Users can query the Hunt database of confirmed C2 servers and build detailed statistics on threat actor activity.

Certificates

Certificates

Users can query first-party certificate data, allowing users to track and identify malicious certificates.

Users can query first-party certificate data, allowing users to track and identify malicious certificates.

HoneyPot

HoneyPot

Users can query honeypot data and obtain detailed stats on internet scanning activity.

Users can query honeypot data and obtain detailed stats on internet scanning activity.

Open Directories

Open Directories

Users can query the Hunt database of past and present open directories. This helps discover malware, exploits and attack tooling.

Users can query the Hunt database of past and present open directories. This helps discover malware, exploits and attack tooling.

Phishing

Phishing

Query an extensive list of phishing sites to identify and track phishing kits and threat actor tooling.

Query an extensive list of phishing sites to identify and track phishing kits and threat actor tooling.

Search and Sort Confirmed C2 Data

Search and Sort Confirmed C2 Data

Search and Sort Confirmed C2 Data

Search and Sort Confirmed C2 Data

The malware database contains 48 searchable fields on confirmed C2 servers discovered by Hunt.


Users can view current C2s and configurations for a specific family, or use the data to build detailed statistics about how and where a malware is being hosted.

The malware database contains 48 searchable fields on confirmed C2 servers discovered by Hunt.


Users can view current C2s and configurations for a specific family, or use the data to build detailed statistics about how and where a malware is being hosted.

The malware database contains 48 searchable fields on confirmed C2 servers discovered by Hunt.


Users can view current C2s and configurations for a specific family, or use the data to build detailed statistics about how and where a malware is being hosted.