H3AD-SEC · platform module

H3AD-HUNT — Threat Hunting

Structured hypothesis-driven threat hunting — pre-built hunt playbooks, KQL and SPL hunt queries, evidence collection templates, and a hunt-to-detection pipeline that codifies what you find.

In Development
h3ad@h3ad-hunt ~ bash
root@h3ad-hunt:~$status
H3AD-HUNTmodule under active development
root@h3ad-hunt:~$ls tools/
HYPOS [LIVE] — hypothesis-driven threat hunting
PIVEX [LIVE] — pivot graph across artifacts
root@h3ad-hunt:~$
LIVE
HYPOS
Hypothesis-driven threat hunting platform. Input MITRE technique IDs, groups, malware, tools, or campaigns. Get structured hunt hypotheses backed by ATT&CK STIX data. Hunt smarter. Miss nothing.
OPEN HYPOS ↗
LIVE
PIVEX
Interactive pivot graph for SOC investigations. Map any artifact — IP, domain, hash, process, user, email, host — through enrichment, correlation, and decision paths. Pivot Across Every Artifact.
OPEN PIVEX ↗
LIVE
TRACEPULSE
Curated threat query packs mapped to active threat actors and campaigns. KQL, Sigma, and XQL hunt queries organized by threat group, malware family, and technique. Threat Query Packs.
OPEN TRACEPULSE ↗