/posts
-
Link analysis with Obsidian
-
Chatbots chatbotting
-
Testing local LLMs
-
Query and analyze Wazuh indexer data with Python
-
(Bash|Grep)-Fu Log Analysis
-
Log analysis with Pandas
-
Archive Wazuh logs and alerts to s3 bucket
-
SELinux
-
Linux hardening with OpenSCAP
-
Install Autopsy to Debian using Ansible
-
Scanning for Indications of Compromise with Loki
-
Investigating iPhone backups in Linux with libimobiledevice
-
Wazuh - The Open Source Security Platform
-
Advanced Intrusion Detection Environment (AIDE) and JSON
-
Use Hashcat to get password of Veracrypt hidden volume
-
Some random Windows things (Applocker, Volatility, etc.)
-
Restrict USB usage with Group Policy
-
Using Falco as Host Intrusion Detection System (HIDS)
-
Tips for networks security assesments
-
Training with DetectionLab
-
Hardening Linux workstation with Ansible
-
Apparmor basics
-
Lock screen when USB device is not present or is removed (Linux)
-
Binding LUKS encryption to TPM with Clevis
-
Attacking LUKS full-disk encryption
-
Monitoring Linux system with Grafana
-
Securing Linux workstations
-
Replacing Rsnapshot with Duplicity
-
Filtering Pfsense firewall logs with Graylog
-
Manage domain-joined Windows machines with Ansible
-
Centralized log collection and monitoring (part 2)
-
Centralized log collection and monitoring
-
Monitoring Ruuvi tags with Raspberry Pi (part 2)
-
Monitoring Ruuvi tags with Raspberry Pi
-
Monitoring Windows login events with WMI
-
Encrypting an external HDD with LUKS
-
Saving files from a (potentially) failing hard drive
-
Debugging Ansible modules
-
Nginx and client certificates
subscribe via RSS