Skip to content
Alex's Knowledge Base
Tools
Initializing search
alexsusanu/alexsusanu.github.io
Alex's Knowledge Base
alexsusanu/alexsusanu.github.io
Alex's Knowledge Base
Network Setup
Architectural patterns
Architectural patterns
CQRS (Command Query Responsibility Segregation)
Domain-Driven Design (DDD)
Event-Driven Architecture
Hexagonal Architecture (Ports & Adapters)
Layered Architecture
Microservices Architecture
Monolithic Architecture
Serverless Architecture
Service Mesh / Sidecar Pattern
Aws
Aws
CloudWatch vs CloudTrail - AWS Services Comparison
Chrome
Chrome
Chrome Extension Development Guide
Simple Counter Extension
Chrome Extension Components Explained
Cli
Cli
IIS Discovery Phase: Commands for a Single Website
API Endpoint Discovery from IIS Server
Network Troubleshooting Commands
LIMS Support Analyst Debug Guide
PowerShell Basics Guide
Complete LIMS Debugging PowerShell Script
LIMS Network and IIS Troubleshooting (PowerShell Only)
PowerShell ↔ Unix Command Reference
PowerShell vs Linux Commands Guide
Complete Windows Laptop Crash Troubleshooting Guide (PowerShell)
Docker
Docker
Docker Commands & Troubleshooting
Docker Fundamentals
Docker Networking & Storage
Docker Orchestration
Glossary
Glossary
Development Terms Glossary
Infrastructure & Networking Glossary
Methodologies & Practices Glossary
Performance & Optimization Glossary
Security Glossary
Helm
Helm
Helm: ConfigMaps and Secrets in Charts
Htb
Htb
netlearn.jsx
Pentesting methology
Workflow
Daily notes
Daily notes
12th_Dec_25_privilege_escalation.txt
12th_Dec_25_shells.txt
Htb commands history
Htb commands history
HTB Commands Summary
HTB Challenge Commands - December 24, 2025
HTB SQL Injection & Exploitation Guide
htb_commands_dec24.txt
John the Ripper Setup
Scripts
Scripts
quick_scan.sh
setup-wifi.sh
Tools notes
Tools notes
PostgreSQL & Tunneling Complete Reference
Debian WiFi + Ethernet Setup Fix
Dhcp
quick check for getcap
Ftp commands
Initial set up wifi
Internal Networks, Cloud Security & Attack Surface - Complete Guide
Ip
John the Ripper Setup
John the ripper
Networking
SSH Session Commands & Port Forwarding Reference
SSH Local Port Forwarding for PostgreSQL
Iis
Iis
Iis scripts
Iis scripts
IIS_Log_Collector_With_Search.ps1
iis_eventlog_collector.ps1
iis_log_collector.ps1
iis_restart_pool.ps1
search-dotnet.sh
search-w3.sh
K8s
K8s
Backup/Restore - Comprehensive Study Guide
CKA Guide: Kubernetes Backup & Restore - etcd Backup, Disaster Recovery & Cluster Management
CKA Guide: Kubernetes Cluster Components - Control Plane & Worker Node Architecture
CKA Guide: ConfigMaps and Secrets - Application Configuration
CKA Guide: Deployments, Rolling Updates & Rollbacks
CKA Study Guide: etcd Backup and Restore
CKA Study Guide: Highly-Available Kubernetes Clusters
CKA Study Guide: Provisioning Infrastructure for Kubernetes
CKA Guide: Ingress Controllers, CoreDNS, and Advanced Networking
CKA Study Guide: kubeadm Cluster Installation
CKA Guide: kubectl Commands & YAML Manifests - Practical Skills Mastery
CKA Study Guide: Manifest Management and Common Templating Tools
CKA Guide: Pod Lifecycle - Creation, Scheduling, Networking, Storage & Logging
CKA Study Guide: RBAC (Role-Based Access Control)
CKA Guide: Robust, Self-Healing Application Deployments
CKA Study Guide: Application Scaling in Kubernetes
CKA Guide: Application Scaling - Manual and Automatic
CKA Guide: Kubernetes Security - RBAC, ServiceAccounts, SecurityContext & NetworkPolicies
CKA Study Guide: ClusterIP, NodePort, LoadBalancer Service Types and Endpoints
CKA Guide: Kubernetes Troubleshooting - Systematic Debugging and Problem Resolution
CKA Study Guide: Kubernetes Cluster Upgrades with kubeadm
CKAD Commands with Explanations
CKAD Commands
CKAD Essential kubectl Commands Study Guide
CKAD Essential Tips & Commands
CKAD Exam Tips & Tricks
Cluster Components - Comprehensive Study Guide
ConfigMap: Inline vs File-Based Configuration
Kubernetes Configuration Management: A Deep Dive
Exam modules
Core Application Lifecycle Management in Kubernetes: A Deep Dive
Kubernetes Glossary – In-Depth Explanations for CKAD & CKA
Understanding initContainers in Kubernetes
Understanding PersistentVolumeClaims (PVC) in Kubernetes
Kubernetes Cluster Internals: Complete Deep Technical Guide
Kubernetes Commands & Troubleshooting
Common Kubernetes Errors
Kubernetes Configuration Management: Complete Deep Technical Guide
Kubernetes Configuration & Security
Kubernetes Core Concepts
Kubernetes Networking
Kubernetes Networking: Complete Deep Technical Guide
Kubernetes Observability & Monitoring: Complete Deep Technical Guide
Kubernetes Security: Complete Deep Technical Guide
Kubernetes Services: Deep Technical Explanations with Istio and Helm
Kubernetes Storage
Kubernetes Storage: Complete Deep Technical Guide
Kubernetes Workload Controllers: Complete Deep Technical Guide
Kubernetes Workloads
kubectl Commands - Comprehensive Study Guide
Kubernetes Annotations – Hidden Power in Metadata
Kubernetes Health Probes - Liveness vs Readiness
Logging Architecture with Sidecar and Elasticsearch
Multi-Container Pods: A Deep Dive
Multi-Container Pods: Complete Deep Technical Guide
Kubernetes Services and Networking: Deep Dive
Deep Dive: Observability in Container Orchestration
Pod Design Deep Dive: Labels, Selectors, Annotations & Networking
Pod Lifecycle - Comprehensive Study Guide
Kubernetes Secrets: Usage and Best Practices
Security - Comprehensive Study Guide
Shared Pod Microservices vs Sidecar Pattern
State Persistence in Kubernetes: A Deep Dive
Kubernetes Volumes: Mounting ConfigMaps and Secrets
YAML Manifests - Comprehensive Study Guide
Lims
Lims
Device Communication Workflow: From Analyzer to Patient Record
Network Troubleshooting Commands
Iis full troubleshooting guide v1
IIS Knowledge Base Guide
IIS Log Management PowerShell Scripts
IIS PowerShell Command Reference
Comprehensive IIS Troubleshooting Guide
IIS Utility Functions - Usage Examples
IIS Monitoring & Utility Functions
IIS Support Quick Reference: Website vs App Pool Restart
LIMS Real-World Hacking & Debug Guide
Ready-to-Use LIMS Monitoring Utilities
LIMS Printer Troubleshooting Guide
LIMS Troubleshooting Procedures and Processes
LIMS IIS Troubleshooting Toolkit
Medical Instrument Interfacing
Medical Laboratory Systems: How Everything Actually Works Together
PowerShell for IIS - Tips & Best Practices
Additional LIMS Debugging Functions
Complete IIS and Windows Environment Variables Knowledge Base
Windows/IIS/PowerShell LIMS Debugging Scripts
LIMS Path Discovery and Generic File System Health
Linux
Linux
Linux Networking Commands Guide
Linux System Administration Commands Guide
Linux Troubleshooting Guide
Med
Med
Laboratory Abbreviations Reference Guide
LIMS Printer Troubleshooting Guide
Mesh
Mesh
Istio - Service Mesh Overview
Linkerd - Service Mesh Overview
Observability
Observability
Monitoring and Debugging: The System's Nervous System
Monitoring and Debugging: The System's Nervous System
Oracle
Oracle
Oracle Database Discovery Phase: SQL Commands for a Single Database
index_generator.py
Oracle Basic SQL Queries - Database Exploration
LIMS Oracle SQL Debugging Guide - Complete Toolkit
Oracle Database Troubleshooting Guide for LIMS Environments
Oracle LIMS Monitoring Scripts
Oracle LIMS Troubleshooting SQL Queries
Oracle Database Conventions and Keywords Reference
Oracle Quick Reference Queries for LIMS Troubleshooting
Oracle Database Reverse Engineering Survival Guide
Oracle Database Troubleshooting Guide for LIMS
SQL Server LIMS Monitoring Scripts
System Analysis Queries
Pentesting
Pentesting
Penetration Testing - Active Directory Attacks Guide
Penetration Testing - Exploitation Frameworks & Manual Exploits Guide
Penetration Testing - Network Pivoting & Lateral Movement Guide
Penetration Testing - Post-Exploitation & Privilege Escalation Guide
Penetration Testing - Reconnaissance & Enumeration Guide
Penetration Testing - Reverse Shells & Payload Generation Guide
Penetration Testing - Web Application Testing Guide
Pentesting notes
Pentesting notes
Basic Start - Run in Parallel
Nmap Scanning Strategies
Troubleshoot Connectivity
Port Scanning
Tools
Tools Summary
Linux /usr/share Directory Explained
What Tech is Used on Web
Wordlists Setup and Usage
Powershell
Powershell
PowerShell to Unix Command Reference Guide
Selenium
Selenium
main.py
Install dependencies
Sql
Sql
LIMS Printer Troubleshooting Guide
System Analysis Queries
Starting point
Starting point
Docker Best Practices
Kubernetes Networking Deep Dive
CompTIA Security+ - Network Security Fundamentals
CompTIA Security+ - Cryptography Essentials
Java Spring Boot - Microservices Patterns
12-Factor App Methodology Compliance
Vocabulary
Vocabulary
Business Strategy & Operations Vocabulary Guide
Finance & Accounting Vocabulary Guide
Generic Corporate Vocabulary Guide
IT & Software Development Vocabulary Guide
Marketing & Sales Vocabulary Guide
Alex's Knowledge Base
Pentesting notes
Tools
¶
nmap
nikto
shodan
amass
whatweb
wappalyzer (no cli)
Back to top