Here I collect notes from ongoing security work: application security assessments, vulnerability research pipelines, code auditing techniques, threat hunting procedures, detection engineering experiments, and IT security hardening practices. The goal is to translate real incidents and assessments into reusable playbooks for fellow defenders.