Neeraj Sihag

Hunting adversaries.
Building the tools to do it faster.

Security researcher and builder. I run detection engineering and threat intelligence operations for enterprise clients — hunting active threat actors, monitoring dark web infrastructure, and building the tooling that makes all of it faster.

On any given day: tracking a ransomware group's leak site, writing detection logic for a new attack chain hitting Indian enterprises, automating what used to take an analyst hours, or shipping a new security product.

I study adversary tradecraft from primary sources — actor forums, real campaigns, leaked tooling — because understanding how attacks are built is what makes detections that actually hold up.

Threat Hunting Detection Engineering Dark Web Intelligence Adversary Research Security Tooling MSSP
01

Threat Hunting

Hypothesis-driven hunting across enterprise SIEM environments. Building detection logic from scratch against real attack chains — not from template rules. Every hunt starts with an adversary behavior, not a vendor alert.

Blue Team +
02

Adversary Research

Reading adversary tradecraft from primary sources — actor forums, real campaigns, leaked tooling. Understanding how attacks are actually built so detections don't fail the moment the playbook deviates.

Tradecraft +
03

AI × Security

Applying LLMs practically to security workflows — alert triage, threat brief authoring, hunt query generation. Shipped THREATPULSE, a chat-based CTI platform, and HuntWire, an agentic threat hunting engine that runs continuous autonomous hunts across the environment.

Intelligence +
04

Dark Web Intelligence

Continuous monitoring of ransomware leak sites, actor forums, and paste infrastructure. Tracking victim disclosures, new group activity, and infrastructure changes before they surface in public feeds. Built tooling to do this at scale.

OSINT +

Technical Stack

Detection & Hunting

  • IBM QRadar
  • Palo Alto XSIAM
  • Splunk
  • Wazuh
  • MITRE ATT&CK
  • Sigma Rules

Development

  • Python / FastAPI
  • React / Vite
  • Laravel / PHP
  • PowerShell
  • SQLite / Postgres
  • Docker

Intelligence

  • Ransomware Site Monitoring
  • Threat Actor Tracking
  • Dark Web Infrastructure
  • Victim Disclosure Analysis
  • Actor Attribution
  • Enterprise Threat Briefing
01

DarkPulse

Live

Real-time dark web threat monitoring platform.

Continuous monitoring across ransomware leak sites, actor forums, and paste infrastructure. Tracks new victim disclosures, group activity spikes, and infrastructure pivots — before they surface anywhere else. Built the full data pipeline from scratch: collection, deduplication, normalisation, and a client reporting layer.

Python React Dark Web Threat Monitoring Ransomware Intel
02

THREATPULSE

Live

Chat-based cyber threat intelligence platform.

Chat-based threat intelligence platform. Feed it an actor name, a domain, a hash — it enriches across live intel sources and generates hunt queries for every major SIEM simultaneously. Presented publicly at the NullU Delhi Chapter meetup.

FastAPI React Claude API CTI Multi-SIEM
03

HuntWire

Live

Agentic threat hunting engine.

Doesn't wait for alerts. Runs continuous, autonomous hunting cycles across the environment — forming hypotheses, querying the SIEM, correlating findings across log sources, and surfacing threats that would never trip a rule. Built to do in minutes what a manual hunt takes hours to run.

Agentic Autonomous Local Inference Python
04

ADSentinel

Live

Active Directory security assessment platform.

Active Directory security assessment platform for enterprise environments. Orchestrates auditing via an authenticated agent, consolidates findings by risk category, and generates client-ready reports — replacing what used to be a manual multi-tool process.

Laravel 13 Filament 5 PowerShell Active Directory MSSP
05

OSINT Engine

Live

Passive infrastructure reconnaissance and actor mapping toolkit.

Passive infrastructure reconnaissance toolkit. Maps exposed services, certificate history, and subdomain relationships to known threat actor targeting patterns. Used operationally to build actor infrastructure profiles and identify pivot points before engagement.

Python OSINT Cert Transparency Actor Mapping
Stealth

[Redacted]

Security infrastructure product.

Architecture complete. Building quietly — the idea is too sharp to surface yet.

Stealth

[Redacted]

Consumer product.

Building quietly.

Public Talk

AI-Driven Cyber Threat Intelligence Pipelines

NullU Delhi Chapter — eSec Forte Technologies, 2026

Presented THREATPULSE — a live demo of a chat-based CTI platform enriching indicators in real time and generating hunt queries across multiple SIEM platforms simultaneously. First public talk at a security community meetup.

Currently: Building detection logic for advanced phishing and identity-based attack chains in enterprise environments. Writing monthly threat intelligence briefs for Indian enterprise clients covering active threat actor activity, emerging TTPs, and recommended defensive posture.

Let's work.

Security work, product collaborations, intelligence engagements — or just to talk tradecraft.