Here I collect notes from ongoing security research: code auditing techniques, threat hunting procedures, detection engineering experiments, and practical hardening checklists. The goal is to translate real incidents and assessments into reusable playbooks for fellow defenders.