<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Mohammad Favas S | Portfolio</title><link>https://favas.is-a.dev/</link><description>Recent content on Mohammad Favas S | Portfolio</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 24 Apr 2026 10:00:00 +0530</lastBuildDate><atom:link href="https://favas.is-a.dev/index.xml" rel="self" type="application/rss+xml"/><item><title>🐧 Linux Infrastructure Hardening &amp; SIEM Orchestration</title><link>https://favas.is-a.dev/writeups/linux-hardening/</link><pubDate>Fri, 24 Apr 2026 10:00:00 +0530</pubDate><guid>https://favas.is-a.dev/writeups/linux-hardening/</guid><description>&lt;h1 id="linux-infrastructure-hardening-and-siem-orchestration"&gt;Linux Infrastructure Hardening and SIEM Orchestration&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Compliance status:&lt;/strong&gt; &lt;code&gt;83%&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Starting baseline:&lt;/strong&gt; &lt;code&gt;26%&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Framework:&lt;/strong&gt; CIS Arch Linux Benchmark&lt;br&gt;
&lt;strong&gt;Environment:&lt;/strong&gt; Arch Linux security lab with Wazuh-based monitoring&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="1-executive-summary"&gt;1. Executive Summary&lt;/h2&gt;
&lt;p&gt;This project documents the hardening of a newly deployed Arch Linux system using CIS-aligned controls and centralized monitoring through Wazuh. The goal was not only to raise the benchmark score, but to build a host that was easier to audit, harder to misuse, and capable of producing actionable security telemetry.&lt;/p&gt;</description></item><item><title>🧅 Peelr: Peel back every secret!</title><link>https://favas.is-a.dev/writeups/peelr/</link><pubDate>Wed, 01 Apr 2026 10:00:00 +0530</pubDate><guid>https://favas.is-a.dev/writeups/peelr/</guid><description>&lt;h2 id="why-peelr"&gt;Why Peelr&lt;/h2&gt;
&lt;p&gt;Modern targets ship huge bundles, vendor blobs, and frontend code paths nobody wants to read line by line. Peelr cuts that down by combining regex-based detection with lightweight token-level flow correlation, confidence scoring, and per-file risk scoring.&lt;/p&gt;
&lt;p&gt;It is designed for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bug bounty recon&lt;/li&gt;
&lt;li&gt;Web app security reviews&lt;/li&gt;
&lt;li&gt;Triage during content discovery&lt;/li&gt;
&lt;li&gt;Repeat scans against changing targets&lt;/li&gt;
&lt;li&gt;Fast CLI pipelines with minimal setup&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It is not trying to be a full static analysis framework. It is trying to be fast, useful, and easy to drop into real recon.&lt;/p&gt;</description></item></channel></rss>