Slides Threat hunting Introduction to Cyber Threat Hunting Why hypothesis-based threat hunting is essential in cybersecurity Hypothesis-Driven Hunting with the PEAK Framework OSQuery Website Repo Table Schema