Notes

Build logs, deep dives, and things I learned the hard way.

I use this section as a technical notebook: experiments, wrong turns, reversals, and occasional wins.

RSS feed How to subscribe Published when there is something worth sharing.
Post templates Formats I use when writing in public

Build Log

Week 3 of building X: what broke, what changed, what I am trying next.

Deep Dive

A technical rabbit hole worth mapping end-to-end.

Teardown

I reverse engineered X to understand Y.

Failure Post-mortem

What failed, why it failed, and how I changed the system.

Learning Journal

Things I was wrong about this month.

TIL

Short, fast discoveries worth remembering.

Featured

Representative posts

A few notes across security, systems, and engineering practice.

Feb 6, 2026 Teardown

CVE-2024-3094: The xz/liblzma Backdoor

How a multi-year social engineering campaign embedded a backdoor in xz Utils that hijacked OpenSSH authentication on Linux systems.

Dec 5, 2025 Essay

What Linux vs. Hurd Teaches Us About Leadership, Engineering, and Life

A long-form reflection on why Linux won and what that teaches about leadership, engineering, and product momentum. Practical lessons for builders who ship, iterate, and grow communities.

Nov 21, 2025 Deep Dive

10 Custom Wazuh Rules Every SOC Should Deploy

A curated set of custom Wazuh decoders and rules for the detections that built-in rules miss — with MITRE mappings and ready-to-deploy XML.

Nov 14, 2025 Build Log

When Your Kernel Panics but You Don't: Lessons from a Linux Recovery

A kernel panic recovery story and the engineering mindset that makes Linux failures fixable.

Aug 11, 2025 Deep Dive

Private AI in Your SOC: How to Run LLMs Locally

Operating LLMs locally can help analysts summarize and triage sensitive telemetry without shipping data to third-party services.

Nov 1, 2024 Deep Dive

Why is it so slow? Troubleshooting DNS, SSH

A practical workflow for isolating slow SSH sessions by separating DNS, TCP, and authentication latency.

Archive

All notes

Feb 13, 2026

CVE-2014-6271: Shellshock

How a 25-year-old Bash parsing bug allowed remote code execution through environment variables, and why it took multiple patches to fix.

Read the note

Jan 23, 2026

CVE-2021-44228: Log4Shell

How a message interpolation feature in Log4j turned every Java application into an unauthenticated RCE target, and what the response revealed about software supply chains.

Read the note

Aug 22, 2025

Writing x86 Shellcode Without Null Bytes

Techniques for crafting position-independent shellcode that avoids null bytes and other bad characters.

Read the note

Jul 8, 2024

AI-Encompassing Encryption / Fully Homomorphic Encryption

Fully homomorphic encryption allows computation on encrypted data, but performance and model constraints still define where it is realistic.

Read the note

Jun 14, 2024

Overcoming Challenges in Upgrading to Wazuh 4.8.0

Upgrading Wazuh 4.8.0 is mostly about compatibility, index management, and keeping agents aligned with the manager and indexer.

Read the note