Hacking Guides
Technical documentation focused on security auditing, defensive configurations, and protocol analysis. These guides follow a structured, usage-oriented approach for educational and professional assessment purposes.
Defense & Hardening
- [2026-01] [NEW] SSH Key Management and MFA Integration - Procedures for securing remote access with hardware tokens.
- [2025-11] [WIP] Post-Quantum Encryption Implementation - Step-by-step integration of NIST-standard algorithms for local storage.
- [2024-05] Kernel Hardening via Sysctl - Optimization guide for Linux kernel security parameters.
Analysis & Protocols
- [2025-08] [NEW] Wi-Fi 7 Traffic Capture and Decryption - Methodology for auditing WPA3-SAE communication flows.
- [2025-02] [WIP] TLS 1.3 Handshake Inspection - Procedures for analyzing encrypted traffic via diagnostic proxies.
- [2023-09] Legacy IPv4 Header Analysis [OBSOLETE] - Documentation of obsolete packet manipulation techniques for older network stacks.
Environment Setup
- [2026-01] [NEW] Sandboxed Analysis Lab with QEMU - Setting up isolated environments for behavioral software study.
- [2025-06] Tailscale Mesh Network Auditing - Usage guide for monitoring traffic across private overlay networks.