Mission Update
Now we automate.
The pod.
The proxy.
The secrets.
One playbook to conjure the setup, one command to repeat the ritual.
Continue reading “Ghost Hands – Automating The Stronghold With Ansible And Podman”The Ghost Operator's Signal
Now we automate.
The pod.
The proxy.
The secrets.
One playbook to conjure the setup, one command to repeat the ritual.
Continue reading “Ghost Hands – Automating The Stronghold With Ansible And Podman”OpenVAS is a katana forged for vulnerability scanning:
It thrives in Docker.
But what happens in the daemonless, rootless underworld?
The Ghost maps the terrain.
Continue reading “Scanning Like a Ghost – OpenVAS in Podman”It’s not for the paranoid. It’s not for the doomsday-prepper.
It’s a free ticket to exit the Tracing Trap.
You live in surveillance.
You are mapped every day.
Convenience is the bait. Tracing is the cage.
Continue reading “Exit The Tracing Trap – Quit Surveillance”Common Lisp is not a trend.
It doesn’t scream for likes.
It doesn’t dance for recruiters.
But under the surface – it breathes.
Code written four decades ago still runs.
Ghosts don’t chase trends.
We pick tools that endure.
Password vaults are the Operator’s allies.
They keep secrets contained.
Versioned.
Secure.
We’ve tested the blades of Passbolt – the open-source team-focused vault.
Vaultwarden is different.
Silent.
Small.
Minimal footprint.
Coding is not typing.
It’s clarity under pressure.
And clarity begins with focus.
The Ghost doesn’t switch tabs. The Ghost doesn’t break flow.
Code and documentation live together – as they should.
The world is a cage.
It’s built on surveillance.
They sell you comfort.
You buy prying eyes.
Your home is a spy.
Your pocket is a beacon.
They know you.
They map you.
Your mind is theirs.
You are tagged from the beginning.
Papers follow you. Trails multiply.
Free Security Policies for Small Teams
“The ghost doesn’t knock. It writes the rules on your firewall and vanishes.”
Continue reading “The Phantom SOP”You dream of a 9-to-5 grind.
Free weekends.
Money falling from the sky.
Then a friend drops a name: cybersecurity.
Suddenly, you see yourself as:
Stop dreaming.
Think again.
DeadSwitch investigates open source tools not for visibility, but for survival.
No sponsorships. No affiliate codes. No fake enthusiasm.
He moves through the noise, testing what matters – what can be trusted, what can be hardened, what deserves a place in the ghost stack.
This time, it’s Passbolt.
Continue reading “Password Management For Ghosts – Passbolt”Ansible is a sharp blade.
For operators craving API-driven command, Semaphore rises from Ansible’s silent core.
DeadSwitch maps it.
Continue reading “Ansible Automation For Ghosts – Semaphore UI”DeadSwitch Security // Hacking Mindset
“In the right hands, it’s a command center. In the wrong ones, a noise beacon.”
C2 stands for Command and Control.
It’s the silent channel between an intruder and the compromised machine.
It’s how payloads receive instructions.
How stolen data gets exfiltrated.
How breaches stay active, coordinated, and lethal.
A C2 is not just a tool.
It’s a networked weapon.
There are editors. There are IDEs. They are loud. They are noisy.
Then there is Emacs – the operating system disguised as one. A silent dagger.
Where the modern world wraps tools in layers of bloat and corporate chains, Emacs remains raw, scriptable, and sovereign.
Continue reading “Emacs: The Editor That Fights Back”Noise is a weapon. Use it wisely.
The ghost makes sound when needed.
Active recon is signal returned – a dance of questions and echoes.
You make noise to extract truth. But every scan is a footprint.
Controlled, quiet, deliberate – or you’re caught before you begin.
Writing is a silent duel.
The editor is your blade. Choose it with precision, or it will cut you down.
DeadSwitch authors in full control. Plain text. Multiple exports.
Headlines. Words. Properties. Razor sharp.
The Ghost’s way of writing-fu.