Start Here — Welcome to the Blog
Welcome 👋 This blog is a collection of practical security guides for building resilient systems and detecting threats. Everything here is hands-on, battle-tested, and designed to be reused in your...
Welcome 👋 This blog is a collection of practical security guides for building resilient systems and detecting threats. Everything here is hands-on, battle-tested, and designed to be reused in your...
From Info-Overload to Intel: I Built a CTI “Brain” to Hunt Threats In cybersecurity, we aren’t drowning in threats; we’re drowning in data. The modern SOC (Security Operations Center) analyst’s d...
A collection of defensive security notes: detections, hunting queries, playbooks, and blue team workflows. SIEM detections (Splunk, ELK/Wazuh) IR playbooks and triage Threat hunting queries...
Index for my Hack The Box (HTB) room writeups. Expect methodology-focused notes and reproducible steps. Enumeration playbooks Exploitation notes Post-exploitation checklists
A hub for write-ups and notes on my DevSecOps projects: secure CI/CD, container security, and “security-as-code” practices. Pipeline security (SAST/DAST, IaC scanning) Container image hardeni...