Hacking Guides

Technical documentation focused on security auditing, defensive configurations, and protocol analysis. These guides follow a structured, usage-oriented approach for educational and professional assessment purposes.

Defense & Hardening

  • [2026-01] [NEW] SSH Key Management and MFA Integration - Procedures for securing remote access with hardware tokens.
  • [2025-11] [WIP] Post-Quantum Encryption Implementation - Step-by-step integration of NIST-standard algorithms for local storage.
  • [2024-05] Kernel Hardening via Sysctl - Optimization guide for Linux kernel security parameters.

Analysis & Protocols

  • [2025-08] [NEW] Wi-Fi 7 Traffic Capture and Decryption - Methodology for auditing WPA3-SAE communication flows.
  • [2025-02] [WIP] TLS 1.3 Handshake Inspection - Procedures for analyzing encrypted traffic via diagnostic proxies.
  • [2023-09] Legacy IPv4 Header Analysis [OBSOLETE] - Documentation of obsolete packet manipulation techniques for older network stacks.

Environment Setup

  • [2026-01] [NEW] Sandboxed Analysis Lab with QEMU - Setting up isolated environments for behavioral software study.
  • [2025-06] Tailscale Mesh Network Auditing - Usage guide for monitoring traffic across private overlay networks.