Skip to content

Desired Wiki Pages

This is a list of desired pages for the wiki. Community members are encouraged to create these pages and help us grow our collective knowledge. If you have an idea for a page, feel free to create it and add it to the appropriate section.

  • Reasoning: The wiki is heavily skewed towards offensive cybersecurity. While a personal cyber incident response guide exists (Cyber Incident Response Guide (Personal)), a dedicated page on broader defensive concepts like threat hunting, SIEM usage (e.g., Splunk, ELK Stack), and incident response would fill a major gap. This page would serve as a higher-level overview or a follow-on to the personal guide, focusing on organizational or team-based defensive strategies.
  • Suggested Location: cybersecurity/defensive-operations.md
  • Reasoning: With numerous guides on self-hosting and cloud services, a page on securing those environments is a critical missing piece. This should cover the Shared Responsibility Model, IAM best practices, and container security.
  • Suggested Location: cybersecurity/cloud-security.md

3. Overhaul the cybersecurity/index.md Page

Section titled “3. Overhaul the cybersecurity/index.md Page”
  • Reasoning: The current page is a glossary. It should be rebuilt as a portal, similar to ai-ml/index.md, with clear sections for Offensive, Defensive, Cloud, and Application Security. The glossary should be moved to its own file.
  • Suggested Location: cybersecurity/index.md and cybersecurity/glossary.md

4. Operationalizing AI: From Model to Application

Section titled “4. Operationalizing AI: From Model to Application”
  • Reasoning: The wiki has excellent guides on running local LLMs. The logical next step is a guide on how to use those models in a practical application, such as building a simple API or fine-tuning a model for a specific analytical task.
  • Suggested Location: ai-ml/operationalizing-ai.md
  • Reasoning: For a security-conscious audience, understanding how to test and break AI models is crucial. This page would cover prompt injection, data leakage testing, and evaluating models for bias and robustness.
  • Suggested Location: ai-ml/ai-red-teaming.md
  • Reasoning: The community’s interest in RF and hardware hacking is evident. A guide on advanced uses for the popular Flipper Zero tool (e.g., rolling code analysis, advanced NFC emulation) would be highly relevant.
  • Suggested Location: radio/flipper-zero-advanced.md

7. Building a Secure Communications Environment

Section titled “7. Building a Secure Communications Environment”
  • Reasoning: This page would synthesize several existing guides (mobile-hardening, tailscale, matrix) into a single, actionable guide for setting up a comprehensive, secure communications capability.
  • Suggested Location: privacy/secure-communications-guide.md

8. Infrastructure as Code (IaC) for the Homelab

Section titled “8. Infrastructure as Code (IaC) for the Homelab”
  • Reasoning: A natural evolution for the server-guides section. This page would introduce Ansible or Terraform to automate the deployment of the services mentioned elsewhere in the wiki.
  • Suggested Location: server-guides/iac-ansible-guide.md
  • Reasoning: To support career-focused members, this guide would explain how to document projects into a professional portfolio, which is especially valuable for those transitioning from military service.
  • Suggested Location: community/technical-portfolio-guide.md
  • Reasoning: OSINT is a core topic but is currently scattered. A centralized page could cover advanced techniques while heavily emphasizing the Operational Security (OPSEC) to conduct research safely.
  • Suggested Location: research/advanced-osint.md

If you are interested in creating one of these pages, please feel free to do so. Your contributions are what make this community great.