Automated systems. Hardened configs. Terminal-native tooling.
This GitHub organization contains the actual infrastructure stack powering GG3-DevNet β a homelab-based environment for DevOps, security, and system engineering practice. Everything here is tested in production-like conditions with a focus on auditability, reproducibility, and secure defaults.
~/gg3-dev
βββ gg3-docs # system architecture, firewall policies, SSH setup
βββ gg3utils # network tools, port scanners, UFW checkers (Python/Bash)
βββ gg3-admin-tools # bootstrap scripts, SSH key management, dotfiles deploy
βββ puppet-modules # config management for Debian servers (in progress)
βββ .gg3.conf # internal-only: shell config, install scripts, redacted from public- XCP-ng β Bare-metal hypervisor w/ static IP segmentation and manual snapshot control
- Puppet β WIP modules for enforcing packages, user config, and service states
- NGINX β Hardened TLS web proxy and Certbot-enabled static site hosting
- UFW β Host-level firewalls locked to key-based SSH only
- Tailscale β Temporary fallback access until WireGuard is deployed
- Bash & Python β Health checks, audits, and provisioning tools run entirely in terminal
# Scan critical range
nmap -sS 10.0.0.0/24
# Check UFW and verify port lock
sudo ufw status verbose
# Deploy internal config
sudo ./deploy.sh --env dev- SSH key auth only β namespaced by function and host
- Firewalls deny all except pre-approved ports
- TLS enforced with manual NGINX hardening
- Dotfiles tracked and deployed like code
- All config changes documented in plaintext and Markdown
| Repo | Role |
|---|---|
gg3-docs |
Lab architecture, config standards, SSH key layout |
gg3utils |
Terminal-native tooling for audits, scans, and monitoring |
gg3-admin-tools |
ZSH/bootstrap automation, SSH key rotation, deploy helpers |
puppet-modules |
Declarative state management (packages, users, services) |
Juan Garcia β @0x1G / 0xjuang
- Email: [email protected]
- Site: about.gg3.dev
- LinkedIn: linkedin.com/in/0xjuang
- No internal IPs, DNS names, or secrets are exposed
- All tools are used actively β nothing speculative or aspirational
- Designed to be portable across Debian systems and lab-scale deployments
Infrastructure shouldnβt lie. Whatβs here reflects whatβs running.
Last updated: June 2025 Β· Signed: 0x1G