Using Mordor
veeral-patel opened this issue · 1 comments
veeral-patel commented
Hey - thanks for this great project! I have to say, I don't fully understand it...I see it provides JSON log files that were created after running attacks, but how should I use this information as an defender? I read the README and the introductory blog post but I still don't understand.
Cyb3rWard0g commented
Hey @veeral-patel ! This is a great example. Every single playbook/notebook leverages datasets from mordor to perform research and validate analytics developed https://threathunterplaybook.com/notebooks/windows/windows.html