LOGIN SUCCESSFUL - WELCOME, VAULT DWELLER
>> You have discovered my threat hunting for-fun project. I hope this information proves useful during your travels.
Hypothesis-driven investigation techniques
Log correlation and pattern recognition
IOCs, TTPs, and adversary profiling
Scripts and detection engineering