Introduction (Video series)
The following video series walks you through the different use cases of the Threatray platform.
Part 1 - Detection and Identification
This is an introduction to Threatray and covers how to detect and identify unknown files.
Part 2 - Hunting and Pivoting
This is an introduction to Threatray and covers how to hunt and pivot between samples.
Part 3 - Reverse Engineering
This is an introduction to Threatray and shows how it supports reverse engineering workflows.
Part 4 - Creating YARA rules for Detection Engineering and Hunting
This is an introduction to Threatray and shows how it supports creating YARA rules for detection engineering and hunting purposes.
Updated 25 days ago