# Welcome

This site is a collection of my notes, research, and insights spanning Offensive Security, Defensive Security, cybersecurity tools, and general knowledge collected from various training platforms and certifications. Whether you're exploring adversarial tactics, refining detection strategies, or experimenting with new security tools, you'll find valuable resources here. This project serves as a knowledge hub for continuous learning and sharing within the cybersecurity community and I'm always adding to it. Welcome to the Vice City Intelligence Project.

***

## (⊙\_⊙)？What's New

{% tabs %}
{% tab title="Feb 2026" %}
New content for Golang has been included:<br>

* [golang](https://viceintelpro.gitbook.io/viceintelpro/golang "mention")
  {% endtab %}
  {% endtabs %}

***

## (づ￣ 3￣)づ  Some Random Ones to Get Started

<table data-view="cards"><thead><tr><th></th><th data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td>An overview of frameworks, GRC, and more</td><td><a href="security-concepts">security-concepts</a></td><td><a href="https://537410186-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FH9oYbVb7VAsDxBfUpLeo%2Fuploads%2FCA2ZfM91mMSv0felJ30V%2Fimage.png?alt=media&#x26;token=049d036f-8dcc-4a4f-a935-681a716a6b67">image.png</a></td></tr><tr><td>Detailed explanations of processes through documentation</td><td><a href="offensive-security">offensive-security</a></td><td><a href="https://537410186-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FH9oYbVb7VAsDxBfUpLeo%2Fuploads%2F2752JVVluKkME8zhOqYs%2Fimage.png?alt=media&#x26;token=6e078b31-544b-44e2-9767-3750220e4983">image.png</a></td></tr><tr><td>Some How-to guides for various topics</td><td><a href="how-tos">how-tos</a></td><td><a href="https://537410186-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FH9oYbVb7VAsDxBfUpLeo%2Fuploads%2F1faprathw8hGqY0YI6Ct%2Fimage.png?alt=media&#x26;token=0f418d04-39b9-4fcb-b409-c2476c817be4">image.png</a></td></tr><tr><td>Getting back to basics</td><td><a href="security-fundamentals">security-fundamentals</a></td><td><a href="https://537410186-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FH9oYbVb7VAsDxBfUpLeo%2Fuploads%2FxdSvJFufjtMXXuT78tu3%2Fimage.png?alt=media&#x26;token=64d51737-221d-42dd-a464-f0d817921b5a">image.png</a></td></tr><tr><td>Learn about DREAD and STRIDE</td><td><a href="security-concepts/risk-assessment-models">risk-assessment-models</a></td><td><a href="https://537410186-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FH9oYbVb7VAsDxBfUpLeo%2Fuploads%2F2VDLvkcxCx3xQvfHUYs5%2Fimage.png?alt=media&#x26;token=4299386d-46b9-469d-8236-4b1c2cf66e71">image.png</a></td></tr><tr><td>Document repository for NIST papers, Cloud Security, and more</td><td><a href="documents">documents</a></td><td><a href="https://537410186-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FH9oYbVb7VAsDxBfUpLeo%2Fuploads%2FHXVygWoZApgoXO3XXB2R%2Fimage.png?alt=media&#x26;token=90570ac4-5a6f-446b-a120-9b5a78e21758">image.png</a></td></tr></tbody></table>
