The Hunter's Ledger

The Hunter's Ledger

Original Threat Intelligence Research
Hands-on malware analysis turned into structured, evidence-based intelligence — technically deep enough to trust, clear enough to act on. Published by a solo analyst for the defender community.
Latest Reports

View all reports →

Mission
Most threat intelligence fails defenders in one of two ways. It is either too shallow to be actionable — headlines dressed up as analysis — or technically rigorous but locked behind paywalls, stripped of indicators, and written for researchers rather than the people responding at 2am.

The Hunter's Ledger exists to fill that gap. Every report here is built from original research: real samples, real infrastructure, real detections. The goal is intelligence that a defender can open, read, and act on the same day — with IOCs ready to ingest, detection rules ready to deploy, and analysis deep enough to actually understand what a threat does and how to stop it.

All of it is free. Defenders should not have to pay to defend.
Note
This is not a collection of open source intel reports, IOCs, or TTPs. Findings are from original research, though they may overlap with known threats.
Navigate
Contributing
Have original research, detections, or IOCs you'd like to share with the community? Reach out at intel@the-hunters-ledger.com — findings can be posted on your behalf as a co-author or attributed however you prefer.
About the Analyst
About Me & Contact
Who I am, my background, and how to reach me directly.
Consulting & Advisory
Malware analysis, IR advisory, detection engineering, and other hands-on services for teams that need depth.
Support the Research
Donate or sponsor a report to help keep this research free and independent.
Resources
MITRE ATT&CK  ·  Sigma Rules  ·  YARA