Introduction (Video series)
The following video series walks you through the different use cases of the Threatray platform.
Part 1 - Detection and Identification
This is an introduction to Threatray and covers how to detect and identify unknown files.
Part 2 - Hunting and Pivoting
This is an introduction to Threatray and covers how to hunt and pivot between samples.
Part 3 - Reverse Engineering
This is an introduction to Threatray and shows how it supports reverse engineering workflows.
Part 4 - Creating YARA rules for Detection Engineering and Hunting
This is an introduction to Threatray and shows how it supports creating YARA rules for detection engineering and hunting purposes.
Updated 3 months ago