In this presentation we share a technique to create great hypothesis and introduce a methodology to conduct Threat Hunting regardless of the Operating System. We introduce you to some items you should hunt in MacOs, and provide some examples of what that looks like. Enjoy!