Post

Defensive Security — Notes

A collection of defensive security notes: detections, hunting queries, playbooks, and blue team workflows.

  • SIEM detections (Splunk, ELK/Wazuh)
  • IR playbooks and triage
  • Threat hunting queries and procedures
This post is licensed under CC BY 4.0 by the author.