As an IT professional working in company integration management, I develop app infrastructure using containers and NVIDIA CUDA for GPU acceleration. My expertise includes automation with Ansible and Kubernetes, along with ongoing education in cybersecurity through pentesting courses. Personally, I maintain a cloud-based web server hosting various applications like email management, password protection, file storage, and automated tasks, showcasing my hands-on experience with diverse technologies. My career goals involve transitioning into DevOps and cloud services roles, aiming to leverage my skills in infrastructure development and automation for innovative solutions.
Welcome to your structured cybersecurity and networking wiki. Below is the categorized table of contents for all available documentation pages.
Configurations and commands to make your Linux system more secure.
Commands and knowledge about managing users and groups in Unix/Linux.
Basic commands for encrypting data, storage, and volumes on Unix.
Fundamentals of shell scripting for automation and system tasks.
Installation and configuration of Kali Linux, the primary OS for pentesting.
Most used tools guide, installation, configuration, and use for open-source intelligence.
Subdomain scraping and related DNS discovery techniques.
How to use Nmap effectively, command breakdowns, and script creation.
Tool guide, configuration, and usage examples for WordPress scanning.
Configuration and commands based on CCNA 1, 2, and 3 for Cisco routers.
Commands and configuration tips for setting up switching environments.
Basic and advanced configuration for Cisco ASA firewalls.
Easy setup and CLI commands for configuring HP ProCurve switches.
A French-dedicated open wiki cloud (BigaCloud project).
Guide to protecting against malicious websites, ads, and bad DNS.
How to install and use the CLI-based password manager securely.
BigaCloud usage policies and terms of service.