glyph.sh
Production infrastructure code, security tools, and automation I've built and deployed - not written about.
If you need working examples instead of tutorials, start here.
What You'll Find Here
Tools, scripts, and guides from real deployments.
Production-Ready Scripts
Python, PowerShell, and Bash automation tested in real environments.
Security Implementations
Practical guides from deploying endpoint protection, incident response, and security tools across distributed environments.
Infrastructure Guides
AWS, Azure, Active Directory, and network security documentation from hybrid cloud implementations.
Privacy-First Tools
Browser-based utilities that run entirely client-side with no data collection.
Everything is free. If it's on this site, it's been used in production.
Latest
Recent Posts
iOS Annoyances Coming from Android: File Defaults, Autocorrect, and AirDrop
March 25, 2026
Claude AI Wrote Code That Could Have Stolen My AWS Credentials
March 23, 2026
Stream iPhone Blackmagic Camera to OBS on Mac with Local RTMP
March 10, 2026
What's Available
Tools • Guides • Scripts • Knowledge
Quick Reference
Featured Cheat Sheets
Essential command references and quick guides for daily operations
Privacy-First
Browser-Based Tools
All tools run entirely in your browser. No data is sent to servers or stored remotely.
Active Directory Troubleshooter
Interactive decision tree for diagnosing common Active Directory issues
Open ToolVendor Default Credential Lookup
Search default usernames, passwords, ports, and management URLs for common network and infrastructure devices
Open ToolEmail Preheader Generator
Generate optimized email preheader text with preview and HTML code
Open ToolKnowledge Base
Featured Documentation
Comprehensive technical guides covering infrastructure, security, and operations
macOS Fresh Start Setup Guide
Complete guide for setting up a new macOS machine with essential development tools, productivity apps, and system utilities
Read GuideAlerting Strategy
Design effective alerting systems that notify the right people at the right time without causing alert fatigue
Read GuideBGP Best Practices
Essential BGP configuration guidelines, security measures, and optimization strategies
Read GuideDisaster Recovery Planning
Strategies and best practices for disaster recovery, business continuity, and data protection
Read GuideHigh Availability Patterns
Design patterns and strategies for building highly available systems that minimize downtime
Read GuideInfrastructure as Code Best Practices
Essential principles and practices for managing infrastructure as code across any platform
Read Guide