Skip to content
View 404saint's full-sized avatar

Block or report 404saint

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
404saint/README.md

RUGERO Tesla (404saint)

Industrial & Network Security | Offensive Security Researcher
Focused on ICS/OT environments, attack path analysis, and resilient infrastructure design.
Building practical labs, custom tools, and security research projects.

Wireshark GNS3 Kali Linux Cisco Nmap Metasploit Python Bash BloodHound PowerShell Git GitHub Actions Go


Areas of Interest

  • Industrial & OT Network Security
  • Infrastructure & Network Architecture
  • Offensive Security Research & Lab Simulations
  • Attack Path & Lateral Movement Analysis
  • Security Tool Development & Automation

Tools & Skills

  • Industrial & OT Network Security Wireshark, tcpdump, SCADA/PLC emulators, GNS3, Kali Linux
    ICS/OT protocol analysis (Modbus, DNP3, BACnet), traffic inspection, anomaly detection, secure segmentation

  • Infrastructure & Network Architecture GNS3, Packet Tracer, Nmap, Masscan
    VLAN design, routing protocols, subnetting, network segmentation, firewall & ACL configuration, topology design

  • Offensive Security Research & Lab Simulations Metasploit, Python/Bash scripting, Burp Suite, virtual lab setups (VMware/VirtualBox)
    Lab design, vulnerability simulation, penetration methodology, exploit PoC development, adversary simulation

  • Attack Path & Lateral Movement Analysis BloodHound, PowerView, Responder, CrackMapExec, Sysinternals Suite
    Mapping attack paths, privilege escalation, lateral movement techniques, network reconnaissance, privilege auditing

  • Security Tool Development & Automation Python, Bash, PowerShell, Git, GitHub Actions
    Scripted automation, custom PoC tools, network scanning automation, log analysis, workflow optimization


Industrial Security & Forensics (Core Research)

Primary focus on hardware integrity and protocol-level analysis within Operational Technology.

  • Guardian-OT — A hardware-aware forensic and integrity engine for ICS/OT removable media. Combines UUID fingerprinting, Merkle-tree style hashing, and entropy-based anomaly detection to secure the air-gap vector. Includes a full researcher dashboard for high-signal triage.
  • MEA (Modbus Exposure Analyzer) — Passive Modbus traffic analysis tool that profiles device activity, evaluates behavioral risk using entropy and communication patterns, and helps identify exposed or misconfigured industrial assets.

🧪 Network Research

Practical experiments and lab setups exploring constrained networking, application-layer pivots, and traffic analysis.

Labs & Experiments:

  • ADB Userspace VPN Pivot — Reverse tethering via ADB and SOCKS5h to route PC traffic through a mobile VPN without root or system modifications.
  • Future Lab Placeholder 1 — Planned experiment in constrained routing or traffic pivoting.

Each lab emphasizes reproducible methodology and security considerations.


🕹️ Featured Projects (Side Quests)

  • SurfaceLens V2 — Modular Attack Surface Management (ASM) framework. Features a multi-provider intelligence pipeline (Shodan, Censys, LeakIX), SQLite persistence for delta tracking, and a Flask-powered tactical dashboard.
  • PersonA-Vault — Secure, compartmentalized persona management system designed around operational separation, encrypted storage, and risk scoring.
  • SurfaceLens — Passive attack surface & Shadow IT intelligence engine built on Shodan data. Supports online/offline analysis and explainable risk scoring.
  • ContextLens v1 — Infrastructure and application-layer prioritization engine. Profiles abstraction layers and provides guided recommendations for assessments.
  • HLS Stream Analyzer — HLS playlist analysis and stream reconstruction framework for security research and media forensics.

Contact

Pinned Loading

  1. 404saint 404saint Public

  2. guardian-ot guardian-ot Public

    Hardware-aware forensic engine for ICS/OT removable media integrity, entropy-based anomaly detection, and industrial protocol hunting.

    Python 1

  3. mea mea Public

    Modbus Exposure Analyzer (MEA) — behavioral and risk analysis tool for exposed Modbus devices.

    Python 1 1

  4. surfacelens_v2 surfacelens_v2 Public

    Tactical Attack Surface Management (ASM) & Shadow IT Intelligence Framework.

    Python

  5. surfacelens surfacelens Public

    Passive Attack Surface & Shadow IT Intelligence Engine (Online + Offline)

    Python 1

  6. contextlens contextlens Public

    Decision-support tool for analyzing domain/IP infrastructure profiles and prioritizing assessment efforts.

    Python 1