The Mission

Enterprise-grade security shouldn’t require enterprise budgets. This site exists because most security guidance assumes unlimited resources, deep specialization, and dedicated teams. Most homelabs and small teams don’t have that.

The focus here is practical security for people who build and maintain their own infrastructure – the kind that works when you’re responsible for everything, not just one slice of the stack. Every technique is developed and tested in a personal homelab before it shows up here. Adapt to your context.


Who This Is For

If you run a homelab and want to do security right from the start, this is for you. Same goes for security engineers on small or understaffed teams, DevSecOps practitioners drowning in tool sprawl, and anyone who’s tired of “best practices” that assume you have a headcount of 40 and a six-figure tool budget.


What You’ll Find

Every article ships with working detection queries you can copy and adapt, complete remediation paths instead of just alerts, and honest tool evaluations that include limitations. Where relevant, posts map findings to compliance frameworks – NIST 800-53, SOC 2, PCI-DSS, CIS Controls, and OWASP LLM Top 10 – for educational reference. Everything is built on open-source and low-cost tools because cost is a design constraint, not an afterthought.


The Approach

Tools are evaluated based on what they actually do, how they fail, and how they fit into real environments – not based on marketing copy. Every recommendation is tested in a live homelab before it gets published. No generic advice. Specific tools, specific commands, specific outcomes.


About Oob Skulden™

Oob Skulden is a pseudonym.

Twenty-five years across enterprise environments. The work has spanned network architecture, systems engineering, database infrastructure, cloud platforms (AWS, Azure, GovCloud), and security – with the last decade focused on security in a regulated industry context where compliance frameworks aren’t academic exercises.

The security work includes architecture review, vulnerability management, cloud security, and identity – the kind of work where the threat model is real, the audit is coming, and “we’ll fix it later” isn’t an option.

This is the first public research series. Everything published here is developed independently, on personal equipment, in a homelab built specifically to break things safely. The lab runs across multiple VLANs and hosts, mixing open-source tooling with custom-built components – because the best way to understand an attack surface is to own the entire stack.

When something appears on this site, it has already been built, broken, and rebuilt. The articles reflect systems that actually run, including the mistakes made building them and the lessons learned fixing them.


Behind the Site

Static by design. The work behind it is not. Articles are backed by homelab experiments, working detection logic, and open-source research validated before anything is published.


Oob Skulden™ is a personal educational project. All content represents personal work created in a personal capacity and is not affiliated with, endorsed by, or representative of any employer, past or present. Content is based on publicly available frameworks, open-source tools, and documented best practices. Compliance framework references are provided for educational mapping purposes only. This site does not provide professional security consulting services.