Skip to main content

Introduction

This documentation serves as a comprehensive collection of my personal notes and technical references across various domains of modern IT and security. The goal is to provide practical, hands-on knowledge, checklists, and tool usage guides for both learning and real-world application.

Whether you are preparing for certifications, working on professional projects, or simply seeking to deepen your understanding, you will find curated resources, step-by-step guides, and actionable tips throughout these sections.

Disclaimer: All techniques and tools described here must only be used in authorized environments and resources (e.g., systems you own, official training labs, or designated practice environments). Never attempt to use these methods on unauthorized systems or third-party resources. Always act ethically and in compliance with all applicable laws and regulations.

What You'll Find

  • AI Security: Notes and resources on securing AI/ML systems, including keyless authentication and best practices (to be expanded).
  • Cloud Security: Strategies for securing cloud environments, including federation, organization policy, and token management.
  • GitHub Security: Best practices and tools for securing GitHub repositories and applications.
  • Pentest: In-depth penetration testing techniques, tool usage (nmap, metasploit, shellter, etc.), privilege escalation, and exam preparation.
  • Web Performance: ISUCON-style web performance tuning, checklists, monitoring, log analysis, and infrastructure tips.

How to Use This Documentation

  • Each section is organized with an introduction, practical guides, and tool references.
  • Checklists and operational tips are provided for contest preparation, daily work, and troubleshooting.
  • Where possible, links to official documentation, community resources, and example configurations are included.
  • Some sections are under construction and will be updated with more content over time.