diff --git a/README.md b/README.md index af126e82..f5f76372 100644 --- a/README.md +++ b/README.md @@ -67,6 +67,11 @@ SOC teams focus on deploying high-fidelity detections across all levels of the D ![image](https://github.com/mthcht/awesome-lists/blob/main/Lists/CheatSheets/mthcht/intelligence_gathering_sheet_for_threat_hunting.png?raw=true) +### Targeted Threat Hunting Methodology Example +![image](https://github.com/user-attachments/assets/a2ec4a06-d94a-4585-8945-10c7ab3361e4) + +Each threat hunting session should have clear objectives. This flowchart provides a structured approach to guide your process, from preparation and investigation to actionable recommendations. + ## Files - [ThreatHunting-Keywords](https://github.com/mthcht/ThreatHunting-Keywords/blob/main/threathunting-keywords.csv) - [Greyware tools keywords](https://github.com/mthcht/ThreatHunting-Keywords/blob/main/greyware_tool_keyword.csv)