Skip to content

Instantly share code, notes, and snippets.

View cywf's full-sized avatar
:shipit:
Tinkering

Kylo P cywf

:shipit:
Tinkering
View GitHub Profile
@cywf
cywf / 06122024.md
Created June 13, 2024 00:10
Maritime Security Incident June 12, 2024 US / RU

Threat Model: Russian Warships in the Caribbean

Step 1: Identify Assets

  1. Commercial and Military Maritime Vessels: Ships operating in the Caribbean, including U.S. and allied naval forces.
  2. Ports and Infrastructure: Key ports in Cuba, the U.S., and possibly Venezuela, along with associated logistics and refueling stations.
  3. Communication Networks: AIS, satellite communication, radio frequencies, and other maritime communication systems.
  4. Trade Routes: Major shipping lanes used for commercial and military logistics in the Caribbean.
  5. Geopolitical Stability: Diplomatic relations between the U.S., Russia, and Caribbean nations, especially Cuba and Venezuela.
@cywf
cywf / threat-hunting.md
Created June 12, 2024 23:15
Threat Hunting for the Next Generation

Introduction

In our tech-driven world, cybersecurity is essential. As technology becomes a bigger part of our lives, the need for experts to protect our digital spaces grows. One of the coolest roles in this field is threat hunting. It's a perfect fit for young people who love technology, solving puzzles, and making a real impact.

What is Threat Hunting?

Threat hunting is all about searching for cyber threats that might have slipped past an organization's defenses. Unlike traditional security roles that wait for alerts, threat hunters actively look for hidden dangers, investigate unusual activity, and understand hacker behavior. Think of it as a mix of detective work, problem-solving, and continuous learning.

Why Threat Hunting is Exciting

@cywf
cywf / intrinsic-motivators.md
Created June 12, 2024 04:13
Intrinsic Motivation

Intrinsic Motivation

Introduction

Science shows there's a hidden motivation switch located deep in the brain that unlocks a level of motivation more powerful than money, praise, or fame—one that practically forces your brain to crave doing the hard work you keep putting off.

The Struggle with Motivation

Picture this: you've set your alarm early, determined to start the day right. When it rings, you hit snooze repeatedly. Last night's enthusiasm has already evaporated, and the blanket weighs you down like a concrete slab. The day ahead feels like an enemy to avoid instead of a challenge to conquer.

@cywf
cywf / pix4d-rtk-gps.md
Last active May 31, 2024 05:56
Pix4D Combined with RTK GPS for Security Applications

Introduction

The integration of Pix4D with RTK (Real-Time Kinematic) GPS technology presents a formidable solution for high-precision mapping and surveying. This technical combination is particularly advantageous in various security contexts, including Executive Protection, Cybersecurity, Homeland Security, Surveillance & Surveillance Detection, and tactical operations in high-threat environments.

Key Advantages

  1. High Precision and Accuracy: RTK GPS provides centimeter-level accuracy, crucial for detailed mapping and surveying in security operations.
  2. Real-Time Data Processing: Pix4D’s software suite allows for real-time data processing and analysis, enabling rapid decision-making.
  3. Enhanced Situational Awareness: Detailed 3D maps and models enhance situational awareness and planning.
@cywf
cywf / IAM.md
Created May 23, 2024 18:59
Comprehensive Guide to Key, Certificate, and Secret Management

Comprehensive Guide to Key, Certificate, and Secret Management

Introduction

In today’s digital landscape, securing sensitive information is paramount. Organizations must adopt robust security practices to protect data integrity, confidentiality, and availability. This guide provides a comprehensive overview of essential aspects of key, certificate, and secret management, offering valuable insights into the design and architecture of these solutions, data security frameworks, cybersecurity governance models, cryptography, SSH key management, certificate management, and secret management solutions.

Each section includes detailed descriptions, interesting facts, use cases, and practical how-to guides, enabling you to implement these critical security measures effectively. Whether you’re an experienced professional or new to the field, this guide will equip you with the knowledge and tools necessary to enhance your organization’s security posture.


Bayesian Analysis: Practical Applications and Examples

Key Concepts

Bayes' Theorem: [ P(H|E) = \frac{P(E|H) \cdot P(H)}{P(E)} ]

  • ( P(H|E) ): Posterior probability
  • ( P(E|H) ): Likelihood
  • ( P(H) ): Prior probability

The KOCOA concept is a framework used in military planning and analysis to evaluate terrain and understand how it affects operations. It stands for Key Terrain, Observation and Fields of Fire, Cover and Concealment, Obstacles, and Avenues of Approach. In the context of Military Operations on Urbanized Terrain (MOUT), KOCOA is essential for understanding and navigating the complexities of urban environments. Here’s a detailed explanation of each component as it relates to MOUT:

KOCOA in MOUT

  1. Key Terrain

    • Definition: Key terrain is any location or area whose control gives a significant advantage to the force that holds it.
    • Urban Application: In an urban setting, key terrain could include high-rise buildings, bridges, intersections, or critical infrastructure like power plants or communication hubs. Controlling these areas can provide strategic advantages such as better observation points, control of movement, and logistical support.
  2. Observation and Fields of Fire

@cywf
cywf / sar.md
Created May 18, 2024 03:30
Synthetic Aperture Radar (SAR)

Coherent Change Detection (CCD) in Synthetic Aperture Radar (SAR)

What is CCD?

Coherent Change Detection (CCD) is a technique used in Synthetic Aperture Radar (SAR) to detect subtle changes in the ground surface or objects over time by analyzing the coherence of SAR data.

Principles of CCD

  • Interferometric Coherence: Measures the phase difference between two SAR images taken at different times from the same position. High coherence indicates little change, while low coherence suggests significant changes.
  • Temporal Baseline: The time interval between the two SAR images is crucial. Shorter intervals typically provide higher coherence and more sensitive change detection.
@cywf
cywf / common-trackers.md
Created February 14, 2024 16:22
A guide on how to disable common trackers and privacy infringing background services on iOS & Android

Disable Common Trackers & Privacy Infringing Background Services on iOS & Android

Introduction

Mobile devices constantly exchange data with various services, many of which track your activities and compromise your privacy. This guide outlines steps to disable common trackers and privacy-infringing background services on iOS and Android devices, helping you maintain control over your personal information.

iOS: Enhancing Privacy

Identifying and Disabling Trackers

@cywf
cywf / bitwarden.md
Created February 14, 2024 16:15
A guide on how to properly and securely setup Bitwarden for iOS and Android Devices

Setting up Bitwarden for iOS and Android Devices

Introduction

Bitwarden is a renowned open-source password manager that helps you store and manage your passwords in a secure vault. Using a password manager like Bitwarden not only simplifies managing your online credentials but significantly enhances your online security.

Installation

iOS