Blog Analysis
This project is a structured navigation layer for Andrey Pautov's Medium blog. It does not duplicate article bodies. It points readers to the canonical Medium posts and organizes them by topic, recency, role, and depth.
Sources Used
- Medium RSS feed:
https://medium.com/feed/@1200km - Medium profile:
https://medium.com/@1200km - Medium master index: Navigate My Blog: All Articles by Topic
- Existing local profile content from the
anpa1200GitHub profile repository - Search-visible Medium article metadata for older high-signal posts
Sorting Rules
The home page uses two sorting models:
- Newest articles: sorted by publish date, newest first, from the RSS feed.
- Topic navigation and direct navigation: sorted like the existing 18-group Medium master index.
The topic order is not purely chronological. It is designed for navigation:
- CTI and threat intelligence
- AI security and HexStrike-AI
- AI-driven pentesting and exploitation
- Web security and scanner workflows
- Reconnaissance and OSINT
- Nmap and network scanning
- Traditional web application security
- Metasploit and exploitation
- Password and credential cracking
- Active Directory and red team
- Cloud and Kubernetes security
- Labs and training environments
- Malware analysis and forensics
- Threat hunting and detection
- Tool development and Cursor AI
- SOC, awareness, and best practices
- Logging, DevOps, and XPLG
- Reader input and meta
Depth Labels
Labels are used to help readers choose the right amount of time and attention:
- Short guide: index page, quick reference, short orientation, or RSS item without enough body text to classify as a long guide.
- Article: conceptual or overview article, usually useful for orientation or decision support.
- Full guide: practical walkthrough or detailed practitioner guide.
- Full-long guide: long-form reference, series part, case study, or deep implementation guide.
RSS-derived labels used approximate word-count thresholds:
- Under 1,200 words: Short guide
- 1,200 to 3,500 words: Article
- 3,500 to 7,500 words: Full guide
- Over 7,500 words: Full-long guide
Some older posts were manually labeled from visible Medium metadata such as reading time and article role.
Practical Tags
The Docusaurus navigator adds practical tags that are easier to filter than Medium's publication tags:
offensivelabcloudtoolctidetectionmalwarewebosintadpasswordssocdevopsai
These tags are assigned by article role and topic group. For example,
HexStrike-AI and exploitation walkthroughs are tagged offensive, vulnerable
environments are tagged lab, AWS/GCP/Kubernetes content is tagged cloud,
and utility or framework posts are tagged tool.
Current Blog Shape
The blog has two major eras:
- Offensive security and tool walkthrough era: classic tools, red-team labs, web security, password cracking, recon, Metasploit, AD, cloud, Kubernetes, and vulnerable lab building.
- CTI and AI-assisted analyst workflow era: OpenCTI, customer-driven CTI, analytic discipline, attribution, ATT&CK, infrastructure pivoting, telecom case studies, AI-assisted CTI, malware-analysis tooling, and vulnerability management.
The current direction is strongly weighted toward CTI, detection engineering, AI-assisted security operations, and practical tool-backed research.
Maintenance Notes
Medium RSS usually exposes the latest 10 posts. When new articles are published:
- Add the new item to
latestArticlesinsrc/pages/index.js. - Assign the correct depth label.
- Add it to a relevant topic group.
- Add it to
directLinksif the article URL is verified. - Run
npm run build.
The original Medium master index remains the broadest source for the full
100+ article map. This Docusaurus site is intended to make that map easier to
scan, filter, and publish as part of the anpa1200.github.io ecosystem.