The Huntress agent looks for threat actors who abuse legitimate applications, bypass other security tools, or are in the process of deploying payloads like malware and ransomware.