HuntSQL™
HuntSQL™
This allows researchers, analysts, and threat hunters to query the extensive Hunt database using the power and flexibility of SQL.
This allows researchers, analysts, and threat hunters to query the extensive Hunt database using the power and flexibility of SQL.
Features
Features
HTTP
HTTP
Users can query first-party HTTP data to identify threat actors and malicious activity.
Users can query first-party HTTP data to identify threat actors and malicious activity.
Malware
Malware
Users can query the Hunt database of confirmed C2 servers and build detailed statistics on threat actor activity.
Users can query the Hunt database of confirmed C2 servers and build detailed statistics on threat actor activity.
Certificates
Certificates
Users can query first-party certificate data, allowing users to track and identify malicious certificates.
Users can query first-party certificate data, allowing users to track and identify malicious certificates.
HoneyPot
HoneyPot
Users can query honeypot data and obtain detailed stats on internet scanning activity.
Users can query honeypot data and obtain detailed stats on internet scanning activity.
Open Directories
Open Directories
Users can query the Hunt database of past and present open directories. This helps discover malware, exploits and attack tooling.
Users can query the Hunt database of past and present open directories. This helps discover malware, exploits and attack tooling.
Phishing
Phishing
Query an extensive list of phishing sites to identify and track phishing kits and threat actor tooling.
Query an extensive list of phishing sites to identify and track phishing kits and threat actor tooling.
Search and Sort Confirmed C2 Data
Search and Sort Confirmed C2 Data
Search and Sort Confirmed C2 Data
The malware database contains 48 searchable fields on confirmed C2 servers discovered by Hunt.
Users can view current C2s and configurations for a specific family, or use the data to build detailed statistics about how and where a malware is being hosted.
The malware database contains 48 searchable fields on confirmed C2 servers discovered by Hunt.
Users can view current C2s and configurations for a specific family, or use the data to build detailed statistics about how and where a malware is being hosted.
The malware database contains 48 searchable fields on confirmed C2 servers discovered by Hunt.
Users can view current C2s and configurations for a specific family, or use the data to build detailed statistics about how and where a malware is being hosted.
Hunt Intelligence, Inc.
Hunt Intelligence, Inc.
Hunt Intelligence, Inc.