hunting-for-webshell-activity

Installation
SKILL.md

Hunting For Webshell Activity

When to Use

  • When proactively hunting for indicators of hunting for webshell activity in the environment
  • After threat intelligence indicates active campaigns using these techniques
  • During incident response to scope compromise related to these techniques
  • When EDR or SIEM alerts trigger on related indicators
  • During periodic security assessments and purple team exercises

Prerequisites

  • EDR platform with process and network telemetry (CrowdStrike, MDE, SentinelOne)
  • SIEM with relevant log data ingested (Splunk, Elastic, Sentinel)
  • Sysmon deployed with comprehensive configuration
  • Windows Security Event Log forwarding enabled
  • Threat intelligence feeds for IOC correlation

Workflow

Related skills
Installs
14
GitHub Stars
6.3K
First Seen
Mar 17, 2026