
Cook up threat hunts that’ll take your security program to the next level.
The next step in your threat hunting journey
The Threat Hunter’s Cookbook builds on the processes explored in The PEAK Threat Hunting Framework, teaching you how to employ fundamental methods to conduct successful hunts.


Ready-to-use threat hunting recipes
Leverage dozens of prescriptive threat hunting queries to address specific threat hunting scenarios, or customize them to match your environment’s needs.
Practical tips from master cyberchefs
Get guidance on selecting the best threat hunting method for your use case and tips on how to make the most of your hunt.


Resources to sharpen your SecOps skills
Dive deeper into the topics covered in The Threat Hunter’s Cookbook with hand-selected documentation, resources, and more from the SURGe security research team.