Welcome to glyph.sh!
I’ve accumulated notes, scripts, and solutions to common problems from working in IT and security. This site is where I’m organizing all of that knowledge into something useful for others.
What’s Here Now
The site is live with several key sections:
Tools - Browser-based utilities that run entirely client-side:
- Subnet Calculator
- Hash Generator (MD5, SHA-1, SHA-256, SHA-512)
- Base64 Encoder/Decoder
- Timestamp Converter
Scripts - Production-ready automation for system administration and security:
- Email security verification (SPF/DKIM/DMARC checker)
- Disk usage analysis and reporting
- Linux and macOS system administration tools
Documentation - Technical guides and how-tos covering security, infrastructure, and automation topics.
The Philosophy
Everything here follows a few simple principles:
- Privacy-focused - Tools run in your browser, no data leaves your machine
- Practical - Real solutions to actual problems I’ve encountered
- Defensive - Security tools are for authorized testing and hardening only
- Transparent - Clear documentation and explanations of how things work
What’s Coming
I’ll be adding more content regularly:
- Additional security posts and research
- More automation scripts for Windows, Linux, and macOS
- Cheat sheets for common sysadmin and security tasks
- Bookmarks and resources I actually use
This isn’t a corporate blog full of buzzwords. It’s a working collection of tools and practical knowledge.
If you find something useful here, great. If you spot a bug or have suggestions, reach out at kevin@glyph.sh.