8000 0xjuang (Juan J Garcia) · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View 0xjuang's full-sized avatar
🌱
Currently working on gtop
🌱
Currently working on gtop

Block or report 0xjuang

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xjuang/README.md

Systems Engineer | DevSecOps | Cyberpunk

Automating infrastructure, hardening systems, and building tools from the ground up.

Python Bash Terraform

Puppet NGINX Cloudflare XCP-ng Tailscale WireGuard

Zsh Vim Zed iTerm2

Debian Linux FreeBSD TrueNAS

GPG Git

tmux asciinema Markdown Obsidian Homebrew


I'm an Automation-Oriented Systems Engineer, building terminal-native infrastructure with a DevSecOps mindset. My work focuses on infrastructure automation, secure scripting, system design, and hands-on experimentation in a purpose-built lab.
While I don’t build frontend interfaces, I manage the full lifecycle of backend systems — from provisioning and orchestration to hardening and monitoring — giving me a comprehensive, operational view of real-world infrastructure.


🔧 Homelab Stack

My self-hosted lab (GG3-DevNet) simulates a scaled-down enterprise environment:

~/GG3-DevNet
├── xcp-ng           # bare-metal hypervisor
│   └── terraform    # VM provisioning via XO API
├── debian           # base OS for prod/dev VMs
│   ├── puppet       # config management for VMs
│   └── nginx        # hardened web services
├── tailscale        # encrypted fallback access
└── bash/python      # scripting, monitoring, automation
  • XCP-ng — Bare-metal hypervisor with static IPs and segmented virtual switches.
    └── Terraform — Provisions Debian VMs via Xen Orchestra API with cloud-init injection.

  • Debian — Uniform base OS across all nodes for security and portability.
    ├── Puppet — Manages system state: users, dotfiles, packages, and services.
    ├── NGINX — TLS-only web server with Certbot integration and hardened headers.
    └── UFW — Default-deny firewall with SSH access restricted to trusted IPs.

  • Tailscale — Zero-trust fallback VPN for remote management if SSH fails.

  • Bash / Python — Custom scripts for auditing, snapshots, port scans, and automation.

  • MacBook + UTM — Isolated staging environment for testing scripts and deployments before live use.

This lab is my research ground — a space to test, break, and secure systems like an operator.


🔐 DevSecOps & Security Practices

My workflow prioritizes repeatability, observability, and least privilege — all driven through terminal-native tooling and version control.

# Audit UFW rules
sudo ufw status verbose

# Scan local subnet for live hosts
nmap -sn 10.10.10.0/24

# Apply configuration state to node
sudo puppet apply ./manifests/init.pp
  • SSH Key Authentication Only
    Namespaced key format (e.g. key.gg3.git, key.gg3.lab.vm1), always passphrase-protected and rotated regularly.

  • Firewall Lockdown by Default
    UFW configured to deny all except trusted SSH ingress. No open ports unless explicitly whitelisted.

  • TLS Enforcement
    Certbot for certificates + hardened NGINX config (no autoindex, HSTS, X-Frame-Options, and other strict headers).

  • Dotfiles as Code
    Managed through Git and deployed via Puppet or symlinked provisioning scripts.

  • Logged Infrastructure Changes
    Markdown (.md) and plaintext (.txt) logs tracked in Git for every configuration, deployment, and state change.

  • Minimal Tooling, Max Clarity
    Only essentials: nmap, ufw, journalctl, systemctl, puppet, bash, python.


📂 Public Projects

These are real tools, scripts, and documentation sets I’ve built and use daily.

  • gtop
    Modular Python snapshot tool for CPU, memory, disk, and network stats.

  • citadel-33
    Secure password generator using user-defined patterns and entropy.

  • gg3utils
    Bash/Python toolkit for audits, health checks, and automation tasks.

  • terraform-xo-vm
    Deploys cloud-init Debian VMs on XCP-ng via Terraform + Xen Orchestra API.

  • gg3-docs
    Architecture blueprints, firewall policies, SSH key schemes, and operational logs.

  • gg3-admin-tools
    System setup helper 77DE s — dotfiles, packages, service states, and recovery tools.

  • vm-utils
    VM lifecycle helpers for provisioning, rollback snapshots, and CLI-driven automation.

  • tech-crucible
    Certification roadmap, personal learning tracker, and daily log entries.

  • 3-iX-WSL-CC
    Legacy burn-in suite for WSL/TrueNAS testing from previous lab iterations.


🧰 Roles I Fit

🔐 Junior Security Engineer

  • SSH key authentication, UFW lockdowns, and TLS-only service exposure
  • Zero-trust fallback access using WireGuard and Tailscale tunnels

🖥️ Linux System Administrator

  • Debian-based environments with config-as-code via Puppet
  • CLI-native workflows for service management, recovery, and troubleshooting

🏗️ Infrastructure Engineer

  • VM lifecycle automation using Terraform and the Xen Orchestra API
  • Cloud-init provisioning with reproducible network and storage configs

⚙️ Junior DevOps Engineer

  • Shell scripting, config management, and Git-driven workflows
  • Custom-built tooling for audits, monitoring, backups, and hardening

📫 Let's Connect


📄 About This README

This README reflects real infrastructure, workflows, and tools I build and maintain inside my lab.

Signed: 0x1G
GPG Fingerprint: E5F5 811F 0BED A8C1 ABEE 8161 708C BC98 E7D3 9F79
Public key: https://keys.openpgp.org/vks/v1/by-fingerprint/E5F5811F0BEDA8C1ABEE8161708CBC98E7D39F79

Last updated: June 15, 2025

Pinned Loading

  1. terraform-xo-vm terraform-xo-vm Public

    Provision and manage virtual machines on XCP-ng using Terraform and Xen Orchestra (XO) API. Designed for repeatable VM deployments in homelab and production environments.

    HCL

  2. gtop gtop Public

    Modular system snapshot tool for DevOps, automation, and orchestration pipelines.

    Python

  3. citadel-33 citadel-33 Public

    A pattern-based password generator written in Python. Designed for terminal use with customizable structure and strong entropy.

    Python

  4. gg3-dev/vm-utils gg3-dev/vm-utils Public

    A collection of scripts and tools for provisioning, configuring, and managing virtual machines across development and lab environments.

    Shell

  5. gg3-dev/gg3-admin-tools gg3-dev/gg3-admin-tools Public

    Administrative Bash scripts for dotfiles management, SSH key setup, and system bootstrapping.

    Shell

0