VAULT 4624
SUCCESSFULL LOGIN DETECTED, WELCOME Vault Dweller

==================================================


>> Welcome to the Vault, fellow hunter! This log aims to outline a number of the most common ransomware behaviours, key things to look for on a hunt, cool stuff I’ve found, and handy query syntaxes for different vendor tools. Happy hunting!


>> To access the information, please select a subject from the list below:



HOME


The following options will provide valuable insight into potential security threats and vulnerabilities within a network. Please select an option from the list to view the content.

>> MICROSOFT


THIS IS MICROSFOT STUFF MAN FILL ME OUT L0L



>> VENDOR SPECIFIC:



  • >> DEFENDER
  • >> CROWDSTRIKE
  • >> CHECKPOINT
  • >> PALO ALTO