Hands-on Splunk BOTS investigations showcasing threat hunting, SPL queries, and detection logic.
-
Updated
Mar 2, 2026
Hands-on Splunk BOTS investigations showcasing threat hunting, SPL queries, and detection logic.
SOC monitoring environment built with Splunk Enterprise — detection rules for brute force, privilege escalation, and account lockout using real Windows event logs and BOTSv1 attack data
A phased cybersecurity portfolio demonstrating Log Analysis, Threat Hunting (BOTSv1), and AI/ML Anomaly Detection. Built with Python, Splunk, and Pandas.
Hands-on Splunk lab work covering SPL querying, alerting, and dashboard building using the BOTSv1 dataset and linux_secure sourcetype, progressing through the full Cyber Kill Chain from reconnaissance to actions on objectives.
Add a description, image, and links to the botsv1 topic page so that developers can more easily learn about it.
To associate your repository with the botsv1 topic, visit your repo's landing page and select "manage topics."