OSINT/InfoSec nerd raised in Portland, OR who has historically lived in/around New York, Seattle, Tokyo, Houston, and Dallas/Fort Worth (DFW). Current owner of two smol cats. I study русский (Russian), українська мова (Ukrainian), polski (Polish), español (Spanish), 日本語 (Japanese), and Tiếng Việt (Vietnamese).
I really wanted to highlight all the things I am connected with on my Twitter bio but I became involved with too many things! This is something inbetween a CV, README, and linklist.
My lovely Twitter acquaintance, Ch33r10 shared their GitHub readme which includes public mentions of them and their work and I thought it was the perfect idea to house all this stuff. Thank you to her for the inspiration.
Let's connect on LinkedIn! https://www.linkedin.com/in/laceykasten/
I’ve worn a lot of hats over the years but I’m looking to find a new role as soon as possible such as:
- Cybersecurity sales roles – whether it’s in development roles, sales rep roles, or in pre-sales engineering / solutions architecting.
- Customer support or customer experience – I enjoy helping customers and making sure their needs are met. Would be happy to do this work again.
- Community management – I’m passionate about building relationships and fostering engagement. I also have a lot of experience organizing and running events, particularly in the cybersecurity space
- cabal / hatemail.io: Editorial staff and key organizer. Working in an international collective to develop and support projects that advance values of online consent, privacy, equity and liberty. cabal also participates in performing security assessments for at-risk and targeted people (https://cyberabuse.nyc/), creating, curating and supporting community works that progress personal security confidence, and monitoring pervasive threats online and investigating harassment campaigns. cabal also supports a diverse community in finding and vetting job opportunities, working with candidates to bolster their resumes and CVs, managing relationships with hiring employers to introduce talent, and developing a embedded job hunting platform. We also do writing, research, and editing support for unique editorials and news on threat intel, cybersecurity, hacking, privacy, tech ethics, tech-based harassment, politics & other relevant topics for hatemail.io.
- HushCon: I started attending HushCon in 2018 at HushCon West in Seattle, WA. I’ve been back to HushCon West every year since. And now I am helping organize the conference as a sponsorship coordinator. HushCon is a premier security conference with hush rules on all talks that happen. I also attended HushCon East located in NYC in 2022 and 2023 and please reach out if you’d like to talk about sponsorship -- we have a really neat sponsorship prospectus that I help maintain.
- stickerlife.org: This is a small archive project that I took on a few years back to digitize and make archived in quality format any and all stickers that are part of the information security world. These are either mailed in or ethically harvested. I also design and make stickers & send them out (sometimes for charity, even)! I have the capacity to do small press runs of stickers, and want to do more.
- hackroost.net: (gh repo) Tiny link list project that was a continuation of an old pinned tweet I had where I collected a list of places cybersecurity talks are uploaded on YouTube.
- terms-list: (gh repo) In an attempt to make my cybersecurity notes cleaner, usable on mobile when I can't access my Word documents, and pull terms out to a simple list, this is an on-going list project of terms relevant to cybersecurity in my studies. My future goals include turning this into having flashcard capability for studying.
- cyber-jobs: (gh repo) Keeping the same look and feel of terms-list, this is a page that details companies that are hiring for Cybersecurity jobs. These can be broad tech companies that hire security roles, recruiting companies that hire for cyber jobs, nonprofits, and defense contracting companies. Each company has a link to the careers page and it is searchable.
- SLEUTHCON - May 24, 2024: Chasing Androxgh0st: Attribution in an Open-Source Cloud Malware Ecosystem. Independent OSINT research performed for Alex Delamotte’s research in prepartion for this talk.
- ThreatWire / Hak5 - March 22, 2024: CVEs ARE DYING. News research and fact-checking / investigation / writing support during endingwithALI’s stream.
- LimaCharlie / Defender Fridays - March 7, 2024: The evolution of threat intelligence platforms with Greg Martin. Writer for the summary of the March 1st, 2024 session of Defender Fridays.
- LimaCharlie / Defender Fridays - February 29, 2024: Developing Enterprise DFIR Skills with Markus Schober. Writer for the summary of the February 23rd, 2024 session of Defender Fridays.
- cabal / Hatemail.io - January 8, 2024: Hatemail News. News research for headlines and fact-checking / investigation.
- GreyNoise, Intelligence - November 2, 2023: Unveiling the Deceptive World: Honeypots vs Honeytokens. Writing by me. Editing support from Nick Roy.
- GreyNoise, Intelligence - June 13, 2023: Splunk and GreyNoise Integration: Discovering Hidden Insights through Feeds and Dashboards. Editing support for Nick Roy.
- GreyNoise, Intelligence - June 2023: Reference Deployment Diagrams. Research and development of documentation with Nick Roy.
- GreyNoise, Intelligence - March 1, 2023: Introducing IP Timeline. Editing support for Brianna Cluck.
- GreyNoise, Intelligence - February 10, 2023: Six Ways to Threat Hunt in GreyNoise. Research support for Nick Roy.
- GreyNoise, Intelligence - February 2, 2023: Introducing IP Geo Destination. Editing support for Nick Roy.
- GreyNoise, Intelligence - January, 2023: GreyNoise Use Case: Contextualize and Automate Threat Hunting. Writing and editing support for the marketing content.
- Atredis Partners - March 29, 2022: Veni, MIDI, Vici — Conquering CVE-2022-22657 and CVE-2022-22664. Technical editing and blog writing support for Brandon Perry.
- cabal / Hatemail.io - January 17, 2022: Here's How We Use DMCA to Fight Nonconsensual Pornography. Editorial editing, editorial co-writing, news research headlines, job posting research, and writing support.
- Atredis Partners - January 6, 2022: Unauthenticated Remote Code Execution Chain in SysAid ITIL -- CVE-2021-43971, CVE-2021-43972, CVE-2021-43973, CVE-2021-43974. Technical editing and blog writing support for Brandon Perry.
- Atredis Partners - October 29, 2021: Exploring Unified Diagnostic Services with uds-zoo. Technical editing and blog writing support for Chris Bellows and Tom Steele for the release of uds-zoo.
- SeaGL (Seattle GNU/Linux conference) - October, 2021: Code of Conduct. Co-writing, policy development, documentation, review and publishing. See blog post about the Code of Conduct (CoC) launch here.
- Cloakwire - October 2021: Mai Finance - Qi DAO Security Audit (public). Technical editing on an external penetration test and vulnerability assessment and smart contract audit.
- cabal / Hatemail.io - August 19th, 2021: The Taliban Have Seized U.S. Military Biometric Data of Afghan Civilians: The U.S. Military Collected Biometric Data on Afghan Civilians. Now the Taliban have it. Editorial editing, editorial co-writing, news research headlines, and writing support.
- cabal / Hatemail.io - June 11th, 2021: Amazon’s Decentralization Plan: Amazon Highlights the Moral Ambiguity of Decentralization. Editorial editing, news research headlines, and writing support.
- cabal / Hatemail.io - May 27th, 2021: Cops Aren’t Really Banned from NYC Pride, and That’s a Shame: Despite NYPD Ban, Organizers Say Private Security Firms Will Replace the NYPD at NYC Pride. Editorial co-writing, news research headlines, and writing support.
- cabal / Hatemail.io - May 13th, 2021: Welcome to Supply Chain Hell: Shortages Highlight Tech and Security’s Critical Role in the Global Market. Editorial co-writing, news research headlines, and writing support.
- Atredis Partners - May 6, 2021: CVE-2021-32030: ASUS GT-AC2900 Authentication Bypass. Technical editing and blog writing support for Chris Bellows.
- Atredis Partners - April 26, 2021: NANDcromancy: Live Swapping NAND Flash. Technical editing and blog writing support for Chris Bellows.
- cabal / Hatemail.io - April 29th, 2021: When You Weren’t Looking, the Surveillance State Grew: Who Needs Science Fiction When There’s Surveillance Policing? / Hacking Legend and “All Around Nice Guy,” Dan Kaminsky Passes Away at 42. Editorial editing, editorial co-writing, news research headlines, and writing support.
- cabal / Hatemail.io - April 15th, 2021: Qoup d’état: What QAnon’s Reddit Migration Tells Us About Misinformation: Guest editorial by members of Tech Against Fascism. Editorial editing, news research headlines, and writing support.
- cabal / Hatemail.io - April 1st, 2021: The Covid-19 Vaccine Complicates the Bot Debate: Bots are Testing Ethical Boundaries Amid Vaccine Distribution. Editorial co-writing, editorial research, editorial editing, news research headlines, and writing support.
- cabal / Hatemail.io - March 4th, 2021: Protect the Digital Peepshow: What’s the Best Way to Consume Adult Content? Editorial editing, news research headlines, and writing support.
- cabal / Hatemail.io - February 18, 2021: Is the GOP Responding to the Texas Crisis with Disinformation? Editorial co-writing, editorial research, editorial editing, news research headlines, and writing support.
- cabal / Hatemail.io - February 11th, 2021: Our Hacker Collective Has an OnlyFans Now ;): We Launched an OnlyFans Page to Help Combat Online Abuse. Editorial editing, news research headlines, and writing support.
- cabal / Hatemail.io - February 4th, 2021: Do Telegram Nazis Dream of Electric Reichs? The Online Trends of Nazi Telegram: Guest editorial by members of Tech Against Fascism. Editorial editing, news research headlines, and writing support.
- cabal / Hatemail.io - January 28, 2021: The Online Universe of Hate Speech is Still Alive and Well: Hate Speech Thrives Despite Recent Platform Crackdowns. Editorial editing, news research headlines, and writing support.
- Atredis Partners - December 7th, 2020: Authenticated RCE in Pydio (Forever-Day) — CVE-2020-28913. Technical editing and blog writing support for Brandon Perry with additional technical peer review from Dion Blazakis.
- Atredis Partners - November 17th, 2020: A Watch, a Virtual Machine, and Broken Abstractions: Garmin Forerunner 235. Technical editing and blog writing support for Dion Blazakis with additional technical peer review from Zach Lanier.
- Atredis Partners - October 17th, 2020: Open Source Technology Improvement Fund (OSTIF): Linux kernel Security Vulnerability Reporting and Remediation Practices Review. Sponsored by The Linux Foundation via OSTIF, Atredis reviewed the Linux kernel’s practices and policies around security vulnerability reporting, processing, and disclosure. As on-staff technical editor / writer at Atredis, my contribution to this project was in technical editing and review of the resulting report. OSTIF released a post via Reddit on this engagement, as well as a written announcement on their official site.
- Atredis Partners - August 6th, 2020: Cloud Native Computing Foundation (CNCF): Attacking Kubernetes: A Guide for Administrators and Penetration Testers. You can read more about this open-source security audit on the CNCF official blog. As on-staff technical editor / writer at Atredis, my contribution to this project was in technical editing of the Atredis Partners white paper. Additionally, a CVE came out of this engagement credited to Charles Holmes at Atredis Partners, CVE-2019-11246.
- secjuice - September 21, 2018: DEF CON Groups: What Works in 2018? Editorial writing, research.
- AfterAll Studio - January 30th, 2013: Move - Tunde Baiyewu music video. Production assistance.
-
Pacific Northwest College of Art (PNCA): Bachelor of Fine Arts (BFA), Communication Design. Dean’s Scholarship recipient. Completed in 2013.
-
School of Science and Technology: High school diploma. Completed in 2009.
-
MEDDPICC sales methodology certified via Andy Whyte’s MEDDPICC training. Completed in 2022.
-
-
Recorded Future Certified Intelligence Fundamentals. Completed April,
- Intelligence Fundamentals Lesson I: Intelligence Overview
- Intelligence Fundamentals Lesson II: Types and Sources
- Intelligence Fundamentals Lesson III: Intelligence Life Cycle
- The Browser Extension
-
-
Microsoft Certification (via Women In Cloud: Cybersecurity) - Completed during 2024 after scholarship approval towards earning SC-900 from Microsoft
- Microsoft: Introduction to Computers and Operating Systems and Security
-
Microsoft Learning Modules - Completed during, 2023-2024:
- Configure SIEM security operations using Microsoft Sentinel: Configure security information and event management (SIEM) security operations using Microsoft Sentinel.
- Automation in Microsoft Sentinel.
- Threat detection with Microsoft Sentinel analytics.
- Connect Windows hosts to Microsoft Sentinel.
- Connect Microsoft services to Microsoft Sentinel.
- Create and manage Microsoft Sentinel workspaces.
- Introduction to Microsoft Sentinel: Get familiar with Microsoft Sentinel, a cloud-native, security information and event management (SIEM) service.
- Microsoft Azure Well-Architected Framework - Security: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
- Prepare for cloud security using the Cloud Adoption framework: Security is a core consideration for all customers, in every environment. But moving to the cloud is a significant change that requires a shift in your security mindset and approach. The Cloud Adoption Framework provides guidance for this security journey by providing clarity for the processes, best practices, models, and experiences.
- Utilize threat intelligence in Microsoft Sentinel.
- Connect data to Microsoft Sentinel using data connectors.
- Connect threat indicators to Microsoft Sentinel.
-
Email Detection Engineering & Threat Hunting Workshop led by Sublime Security founder/CEO Josh Kamdjou and Alfie Champion, Co-founder of delivr.to. Participated in this workshop ahead of BSides Las Vegas 2023 and DEFCON 31 to offer feedback and test the training labs.
-
Applied Physical Attacks on Embedded Systems, Introductory Version (at Portland OWASP Training Day 2018) by Joe FitzPatrick.
-
OWASP Amass: Discovering Your Exposure on the Internet (at Portland OWASP Training Day 2019) by Jeff Foley.
-
The Linux Foundation - Open Source Introduction (LFC202), Completed, December, 2021.
-
Japanese Conversation: Level 1, (at Portland Community College) by Tsukumo Barrett. CRN: 12499, Winter, 2020
-
Japanese Conversation: Level 2, (at Portland Community College) by Miyoko Fuse. Spring, 2021
- GreyNoise, Intelligence: I was one of the friendly Sales Engineers enabling sales to happen from a engineering perspective including in-depth demos, proof of value (POV) engagements, and creating content that documents and reflects on all the integrations and great things you can do with GreyNoise. I was a frequent contributor to marketing content, educational content, product documentation, and participated in/around conference and event coordination.
- Atredis Partners: At Atredis, an attack research and penetration testing consultancy firm, my day job was being the lovely on-staff tech editor / tech writer. Due to the nature of my work, much of it fell under heavy non-disclosure. But there’s some fun public work that’s listed in the publications section here. My job also involved working as part of the Client Operations team in part of the sales engineering / scoping side of things, social media management including working on blog posts, being passionate about our vulnerability disclosure process, and wearing some other hats.
- secjuice: secjuice is a non-profit, independent and volunteer lead publication in the information security space where I previously wrote articles, collaborated with other writers and editorial staff, provided critique and peer review of other writers and more.
- chanscan.com: Created by Jake Creps, ChanScan was an open source knowledge base for language used by online subcultures helping researchers, journalists, open-source intelligence (OSINT) analysts, threat intelligence analysts, and other users with in-line term highlighting and accompanying wiki. I wrote a lot of wiki entries and helped in discussing feature planning and collaboration.
- Sticker Cabal: This was a loose organization of folks found via Twitter who had large collections or make a prolific amount of stickers in the infosec/hacking world. We had mailings where members receive big parcels of stickers from other members or found at conferences, and team up with attrition.org to do auctions for charities. Some of the work this group does included Diecut Digest and the work that Straithe does there.
- JuiceDB: Previously I used to moderate and work on the world’s biggest e-juice / vaping database about products. Countless hours spent adding descriptions of products, cross referencing official sites for data integrity, identifying tags to merge, categorizing tags, and user experience (UX) testing of the mobile application pre-release for Apple devices.
- The Freeman Company: My role at Freeman was as a customer support online content representative. This team was responsible for spinning up websites and participating in the event and trade show event management process handling hundreds of shows yearly. I also worked with Freeman’s Canadian branches to localize bi-lingual documentation for French-Canadian events and provided support in proofing, editing, and collaborating on educational internal and external departmental documentation.
- AfterAll Studio: In 2012 I was selected as one of AfterAll’s interns. This multi-media design studio is located in Portland, OR. One specific project I had a production assistant role in was shooting Tunde Baiyewu’s Move music video. You can see more of AfterAll’s work at the main website as well as the production side of the house site.
- Bent Image Lab: In college, I worked at Bent Image Lab to provide client services support during the fall of 2011. Sometimes this meant wrangling coffee but the main goal was to make sure meetings with clients during scoping and review went smoothly.
- Pacific Northwest College of Art (PNCA) / Museum of Contemporary Craft (MoCC): Throughout the years I had several positions and worked on a ton of projects at PNCA / MoCC that served as foundational experience. We worked to develop and populate events on the web calendar and management platform developed in house, content managment and website redesign for MoCC, and development and support (metadata / media management) on Mimi, the PNCA archive platform. I am probably forgetting some things, I wore a lot of hats here!
- Oregon Health and Science University (OHSU) / Oregon Graduate Institute School of Science and Engineering (OGI): As a biomedical computer science intern I was nestled in with all the researchers as they did brilliant stuff at the Center for Spoken Language Understanding (CSLU). You can probably find bad ColdFusion code I wrote back then still alive.
- Stellar Cyber CTF: April 26th, 2024. (Of course, within the first 26 seconds I entered my first flag... ‘Lockheed Martin’).
- Hacktoberfest 2019: Participant. Contributed to open source during October in 2019.
- Nolacon 2018: CG Silvers 2019 OSINT challenge as a remote member of team Tailpuft. The CG Silvers competition is an OSINT capture the flag (CTF) competition.
- BSides PDX 2018: Trace Labs 2018 OSINT competition as a member of the team Qult of the Quantum Qows. This CTF involves using OSINT on real missing persons to submit information valuable to their return to law enforcement agencies.
- Scarecrow Video: Supporting and being a member of the Scarecrow Video, an independently owned non-profit video sales and rental store in Seattle, WA. It has over 132,000 titles.
- Open Web Application Security Project (OWASP) Portland Chapter & Seattle Chapter: I am a lifetime member of the OWASP organization and am connected to the Portland chapter. Soon, I want to be involved in the Seattle chapter.
- DEF CON Groups: DC Group #dc503, Portland, OR: The official DEF CON group of Portland, my hometown. I participate in helping volunteer and assist in the yearly #dc503 DEF CON events.
- DEF CON Groups: DC Group #dc541, Eugene, OR: My home DEF CON group where we met on the second Saturday of the month. I am still involved online with this group but less so now that I have moved.
- GreyNoise Queer ERG: GayNoise: Helped in founding of the queer employee resource group (ERG) at GreyNoise, Intelligence.
- Women’s Society of Cyberjutsu: Previous membership at this org, a 501(c)3 International nonprofit community, focused on empowering women to succeed in the cybersecurity industry.
- PDX2600: Formerly attended the Portland chapter of 2600, a historic hacking / phreaking meetup.
- Portland Area Scientific and Cultural Advancement League (PASCAL): A now defunct Portland hackerspace where I had deep involvement in event organization, hosting, being a member, helping out with the website, showing up to board meetings and more.
- SeaSec / SeaSec East: I attended SeaSec/SeaSec East, one of Seattle’s local area security meetups.
- Rainsec: I occasionally still attend the Portland CitySec meetup called Rainsec but I don’t live in Portland anymore :(
- CTRL-H - PDX Makerspace: I am a former patron of the Portland hackerspace where I participated in and attended regular meetups there such as PDX Exploit Workshop (a security meetup), Dork Bot (a makerspace focused meetup), Open Hack Nights and Open Houses (general meetups). You can sometimes see me attending stuff from abroad in Seattle, :) I keep in touch with the Portland community.
- WWCode Portland: Previous attendee of Portland’s chapter of WWCode (Women Who Code).
- Donut.js: Previous attendee of Portland’s Donut.js meetup which occurred monthly to host talks on tech, creativity, community, and the intersection of all of those topics.
- Freeman Women's Development DFW Chapter: Member of the employee resource group (ERG) for women at The Freeman Company.
- Pacific Northwest College of Art’s Student Council: During my time at PNCA I participated as a Public Programs Student Liaison to the student council. I would bring information happenings about events and communications to the council and bring information from the council back to the Public Programs / Communications department.
- Pacific Northwest College of Art’s Center4Design: This small design studio existed within the Communication Design department at PNCA and provided design services to actual clients. I worked on the design and branding work for Maryhill Museum of Art in Goldendale, WA located in the gorgeous Columbia River Gorge.
- Pacific Northwest College of Art’s Submit Magazine: Participated in the creation of PNCA’s student publication, Submit magazine while I was attending the school.
- Security BSides - BSides PDX: Previously organizer who wore many hats in this organization, 2018-2021. Lead sponsorship to a level of growth of $100,000+ in sponsorship contributions, built countless relationships new and old with vendors. Sat on the board of directors from 2019-2021, ran for election and ran for chairman seat. There are few parts of this conference that I didn’t have my hands in.
- DEF CON® Hacking Conference: I have attended DEF CON for the years of DC20, DC21, DC24, DC26, DC27, DC28, DC29, DC30, DC31, DC32. Often sponsored by companies, I have also attended as a scholarship recipient from the Women in Security and Privacy (WISP) org. I used to help host parties for Atredis Partners or GreyNoise maybe you saw me getting up to shenanigans like buying the Car Hacking Village Chang Li Tiny car at DC29.
- SeaGL (Seattle GNU/Linux conference): In 2021 I helped out the fantastic Seattle FLOSS (free/libre/open source software) conference. I served the org as the volunteer coordination committee co-chair and code of conduct co-chair. I also participated in or sat in on the programming, finance, partnerships, and tech committees. During the conference I managed a team of speaker wranglers, troubleshooted live streams run by Streamyard and Restream, helped with the custom Element based Matrix server hosting the conference’s chat platform, assisted speakers/attendees/sponsors with any help requests, and moderated channels throughout the conference.
- THE NET GALA: In March of 2024, several folks came together to host THE NET GALA in New York. I helped in planning (small contribution, really), but I also worked the doors, helped with logistics and with teardown on site.
- HackBoat: As a former key conference organizer for this conference, I have been participating in getting this back off the ground in 2024. I helped found the initial conference, with social media, speaker organization and assistance throughout. This event went on hold due to COVID-19, but returned in 2024 successfully.
- HellaConf: Appsec conference held by the folks behind HellaSecure. I provided support during the virtual conference for information on speakers in chat as well as moderation for chat.
- AppSecUSA 2018: In San Jose, I was awarded the OWASP Bay Area Diversity Sponsorship to AppSecUSA 2018. This fantastic conference on Application Security is to this date one of the best conferences I have been privileged to attend.
- The Diana Initiative (TDI): Volunteer as a community manager and InfoBooth volunteer for the 2020 TDI conference including learning how to spot and report abuse, troubleshoot the Hopin platform, and more.
- ToorCon: Attended Toorcon in 2021. This conference is fantastic at making opportunities for genuine connection to happen and brings fantastic speakers to San Diego.
- Security BSides - BSides Las Vegas: As a BSides organizer I attended BSides Las Vegas in 2019, 2023, and 2024 which is a fantastic Security BSides but also there’s a meetup within this conference where BSides organizers from all over share knowledge.
- Security BSides - BSides Boise 2019: I had the pleasure of visiting BSides Boise in 2019, a conference in Idaho that blends several regions of Idaho into one conference. This is now called BSides Idaho.
- Shmoocon: Attendee in 2022, 2023, 2024, an exclusive and premiere security conference located in Washington, D.C. The last Shmoocon will be in 2025, but I have no ability to attend unfortunately.
- Splunk .conf 2022: Attendeed as a booth attendee for GreyNoise, Intelligence.
- ftp://con:2022 and ftp://con:2023: Attended the virtual antifascist hacker conference of ftp://con online.
- Eyebeam: Attended in 2021, a conference that combines tech folks, artists, scholars and more in an attempt to refigure the future into a better world.
- Infosec Campout 2021: This magical sleepaway camping experience in the Pacific Northwest pairs infosec talks with the outdoors near Seattle, Washington. A cathartic, educational, and wholesome experience.
- ShellConLA: Attendee in 2020 and 2021, a local Los Angeles security conference.
- The AGORA: This was the oldest and largest security conference in the Pacific Northwest hosted at the University of Washington. Invite only and strictly adhering to Chatham House Rules. I attended from 2018-2019 when the conference concluded it’s run.
- Time Based Arts Festival (TBA:): Attended and volunteered for several years at the TBA festival hosted by the Portland Institute for Contemporary Art (PICA) in Portland, OR. One time I volunteered at Mike Daisey’s ‘All The Hours in the Day’ monologue which lasted for 24 consecutive hours.
& I can guarantee you I have forgotten some stuff on here. I’ve watched many talks / participated virtually at other conferences too.
- Ch33r10 for inspiration (You can find her GH above.)
- Akash1362000 whose README I looked at as an inspiration
- Canva was used for the opening graphic banner (not sponsored)