Threat hunting is an important supplemental part of normal security operations and focuses on the proactive detection of threats that would otherwise go unseen. Understanding the cyber threats an organization faces through cyber threat intelligence helps focus threat hunting activities. When threat hunting, you must know what threats the organization may face and proactively hunt these with the assumption that the existing defenses may have been beaten and an adversary may have gone undetected. By using adversary simulation, automated or manually, the threat hunters can emulate the TTPs of threat actors and enable more efficient threat hunting. CTI and adversary emulation result in fore multiplication of a threat hunting teams outputs.