To actively identify potential security flaws, organizations are frequently embracing “Red Team Hunt” – a technique of early scanning for deficiencies. This involves a focused team, or a individual resource, executing automated and direct scans of networks to simulate actual attacker actions. Unl