Introduction (Video series)

The following video series walks you through the different use cases of the Threatray platform.

Part 1 - Detection and Identification

This is an introduction to Threatray and covers how to detect and identify unknown files.

 Part 2 - Hunting and Pivoting

This is an introduction to Threatray and covers how to hunt and pivot between samples.

Part 3 - Reverse Engineering

This is an introduction to Threatray and shows how it supports reverse engineering workflows.

Part 4 - Creating YARA rules for Detection Engineering and Hunting

This is an introduction to Threatray and shows how it supports creating YARA rules for detection engineering and hunting purposes.