Hello World

Introduction Post

Starting in early 2025, I intend to use this blog to document some of the things I learn as I go about my job. The bulk of the posts will be focused on configuration gaps, abuses, and/or manipulations that a threat actor could leverage or introduce in a Linux environment.

Last updated on Dec 23, 2024 20:13 UTC
Built with Hugo
Theme Stack designed by Jimmy