Argv.Blog
2025
Understanding Ansible Semaphore by Building a Hardening Audit Pipeline with Lynis, and Prometheus
1030 words·5 mins
Development
Infrastructure
Linux
Sysadmin
Building an automated Linux hardening audit pipeline using Ansible Semaphore, Lynis, and Prometheus
An Agentic Workflow for YARA-L: Automatic Rule Generation with Gemini CLI and Chronicle
2147 words·11 mins
Projects
AI
Development
Infrastructure
LLM
This is a small framework I put together to generate YARA-L detection rules with an LLM in a self-correcting feedback loop. It aims at automating Detection Engineering for Google SecOps (Chronicle)
Architecture overview: Designing a Self-Managing Linux Fleet
1499 words·8 mins
Projects
Development
Infrastructure
Network
Architecture
I needed an All-Terrain Linux fleet that could take care of itself: configure, monitor, patch, and protect itself across any environment. This post covers the architecture I designed to make that happen.
Agentic Sysadmin. No Playbooks, No YAML
1343 words·7 mins
Projects
AI
Development
Infrastructure
LLM
This post shows the minimal proof of concept SSH tool I built for Opencode AI, and how it could be used to “talk to” remote machines.
Firewall Inception: My pfSense Lab with Proxmox, Cloudflared, and Tailscale
2653 words·13 mins
Projects
AI
Development
Infrastructure
Cloud
Programming
A simple pfSense ACL project turned into a homelab adventure: Proxmox networking, Cloudflared proxying, and Tailscale inception for remote access.
Building a Remote SDR “Observatory” with Proxmox and Tailscale
799 words·4 mins
Sdr
Rf
Linux
Aerospace
Radio
HomeLab
Projects
I turned an RTL-SDR dongle in my homelab into a full-time, remote-access RF observatory. This guide covers setting up a Proxmox VM as an SDR server with rtl_tcp, securing it over Tailscale, and streaming signals to GQRX from anywhere in the world.
Linux Iptables quick reference
1197 words·6 mins
Linux
Terminal
Shell
Firewall
Reference
Network
Networking
iptables in 5 Minutes: a quick cheat-sheet for quick rule edits, safe testing, and making changes stick, without tripping over firewalld, UFW, or nftables.
MacOS Setup for Efficiency | Part 1: Raycast
1260 words·6 mins
Setup
MacOS
Productivity
Reference
Intro and Raycast showcase
Coding with AI: faster than ever, but a bit dumber. MIT explains why
1009 words·5 mins
AI
LLM
Programming
Golang
Development
I used AI to learn Golang in 2025. I was faster than ever, but couldn’t remember what I’d written. A recent MIT study explains why.
Bash History Expansion and Prompt Magic
471 words·3 mins
Linux
Scripting
Programming
Terminal
Bash
Shell
Interesting and useful use cases of !, #, and ? expansions in Bash
DoS by playing Janet Jackson: CVE 2022‑38392
707 words·4 mins
Vulnerabilities
CVE
JanetJackson
Music
Side-Channel
Denial of Service by playing Janet Jackson’s “Rhythm Nation”
Booting a private AWS EC2 instance with Tailscale
850 words·4 mins
Tailscale
AWS
Server
Sysadmin
Network
Reference
Booting up an AWS EC2 Instance with Tailscale baked in for a quick homelab testing environment
Debian Linux Post-installation setup
388 words·2 mins
Linux
Setup
Debian Linux post-installation checklist: Basic installations and configurations for Terminals, Networking, utilities, etc.
Who's monitoring my monitoring Infrastructure? Desigining for observability with Grafana stack
1922 words·10 mins
Projects
Network
Development
Cloud
Infrastructure
Cybersecurity
In this post, I go through the design process of setting up a monitoring stack with Grafana and Prometheus, along with a couple of Prometheus custom node exportes, inside a Tailscale network, to monitor a SIEM collection infrastructure stack.
Link to Github repository:
Argandov/Engineering-Patterns Monorepo for a collection of infrastructure & automation patterns for different purposes. Python 1 0
My Current Workflow
663 words·4 mins
Development
HomeLab
Workflow
My current workflow and overall setup in Linux, MacOS and Windows.
☕️ Cold Brew Recipe
393 words·2 mins
Recipe
Random
Recipe for a nice cold brew coffee concentrate
Logs as Code: Building Iris
1297 words·7 mins
Projects
Cloud
Security
A weekend project turned into Project Iris - A serverless ETL pipeline that bridges the gap between modern vulnerability management and SIEM platforms. This first post dives into the first decisions, challenges, and lessons learned in building a cost-effective, secure, and scalable solution using Google Cloud Platform.
SSH Tunneling and Port-Forwarding guide
592 words·3 mins
Ssh
Reference
Networking
Security
Port-Forwarding
Tunneling
Linux
Sysadmin
A brief SSH tunneling & proxy methods guide - Dynamic, Remote & Local port-forwarding. Tunneling and Hardening resources.
Red Team Phishing infrastructure + payload setup
2577 words·13 mins
AWS
Projects
Blue
Development
HomeLab
Infrastructure
Pentesting
Red
Team
Cybersecurity
Buildout of an OSPEC prepared Phishing infrastructure as well as FUD decoys and payloads.
Termbot Use Cases
595 words·3 mins
AI
LLM
Development
Projects
Reference
Useful ways to leverage Termbot as a Linux CLI LLM tool. From piping/redirecting stdout to reading text from local files, it allows for several combinations of “data chaining”
2024
CSPM Pt 1 Deepfence Threatmapper Installation & Tests
267 words·2 mins
Projects
AWS
Cloud
HomeLab
Infrastructure
Networking
Cybersecurity
I’m installing and testing Deepfence’s Threatmapper for the first time, an Open Source Cloud Native Application Protection Platform (CNAPP) - To test it against some use cases and understand it a bit better.
Azure Service Principal Automation
365 words·2 mins
Azure
PowerShell
Quick script to create a Service Principal (Enterprise App) with Global Reader / Viewer on a specified Azure Subscription
About Weaver
339 words·2 mins
Projects
Development
AI
LLM
Weaver is a tool I made for extracting saved acticles from pocket , with a specific tag, and summarize them with OpenAI GPT-4. This way I can save blog posts, documentation, etc. And periodically use Weaver to extract summaries of all of them at once.
Termbot
360 words·2 mins
Projects
AI
Development
LLM
Termbot is a command-line interface tool for conveniently interacting with OpenAI’s GPT-X or Groq’s natural language processing system, directly from your terminal. It allows the user to use standard ChatGPT-like question/answer functionality, with added flexibility such as interacting with local file contents, sending large data from STDIN, using custom local instructions, and more.
SSH Config File - Quick Connection
382 words·2 mins
Linux
Shell
Sysadmin
Using aliases with SSH for quick & easy connections
PNG to Favicon.ico with ffmpeg
134 words·1 min
Web
Website
Development
Linux
Tools
Reference
Quick how-to: Create favicon.ico from PNG by using FFMPEG
2023
Active Directory Houndsquad
1275 words·6 mins
Active Directory
Windows
Pentesting
Exploring the Active Directory Houndsquad: BloodHound/Sharphound, PlumHound, and GoodHound for Red and Blue Team operations.
Setting up TLS in MS Windows RDP
365 words·2 mins
Active Directory
PKI
Windows
The process of setting up TLS in Microsoft Windows Remote Desktop Services. No certificate verification Server or Revocation lists are taken into account.
2022
A proposed new way of reading books
252 words·2 mins
Personal
Development
Of all the reading techniques and tips I’ve seen and tried over the years like Speed reading techniques, Feynman Technique, Flash Cards / Notecards, etc. Nothing has actually sticked with me. Here, I proposed a new way, that has helped me develop a deeper comprehension and higher engagement while reading.
CTF Writeup - Breaching AD
444 words·3 mins
Active Directory
Microsoft
Pentesting
CTF
CTF Writeup - Zerologon Exploitation
76 words·1 min
Pentesting
Vulnerabilities - CTF
CTF Writeup - Tech Support
236 words·2 mins
CTF
Writeup
Pentesting
CTF Writeup - Intrusion Detection
270 words·2 mins
Pentesting
CTF
TryHackMe | Intrusion Detection 💡 Attacking Grafana & testing Wazuh HIDS & Suricata NIDS
CTF Writeup - LOLBAS
582 words·3 mins
CTF
Microsoft
Pentesting
CTF Writeup - Brainpan
1530 words·8 mins
CTF
Writeup
Buffer-Overflow
Tryhackme writeup: Brainpan" Brainpan is part of the “Offensive Pentesting Path” in TryHackMe, and it is a straight-forward buffer overflow activity with further extra steps to achieve full privilege escalation.
2021
Linux User switching with their own password
290 words·2 mins
Reference
Linux
Sysadmin
A procedure to allow users to switch (su) to another user, using their own password instead of the “target” user password
Running NetworkMiner on Linux
524 words·3 mins
Reference
Linux
Forensics
Network
Using Mono utility to run NetworkMiner, a Windows utility for PCAP analysis
CTF Writeup - Alienphish Challenge
402 words·2 mins
CTF
Forensics
This CTF was part of the event hosted at ctf.hackthebox.eu “Cyberapocalypse”. Mission: Find a payload and a flag inside “Alien Weaknesses.pptx”
YAVG: Yet Another Vim Guide
1539 words·8 mins
Vim
Linux
Shell
Bash
Development
Setup
Programming
Reference
Spending some time learning Vim to save time
2020
Firefox hardening quick guide
280 words·2 mins
Hardening
Cybersecurity
Browser
Reference
The results of this guidelines render only a casual-use Firefox configuration. If you have special privacy/anonimity needs, or are concerned about sofisticated attack vectors, then please do not use Firefox (Or use it with other privacy-enhancing services/softwares). Do your own modifications and research as needed.
CTF Writeup - Retro Boot to Root
351 words·2 mins
CTF
Microsoft
Pentesting
CTF Writeup - Attacking ICS
1273 words·6 mins
CTF
SCADA