Skip to content
View Rootless-Ghost's full-sized avatar
💜
Void Ninja
💜
Void Ninja

Block or report Rootless-Ghost

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Rootless-Ghost/README.md

Title


Typing SVG Typing SVG

Tagline



Chillin


TryHackMe

TryHackMe Badge

Obsidian VMware TCM Security


$\color{Goldenrod}\Large{\textsf{About Me}}$


Former Navy Hospital Corpsman to cybersecurity with real-world combat experience. I bring military discipline, high-pressure decision-making skills, and a systematic approach to threat detection and incident response.

Purple Team & SOC Focus — building both offensive and defensive capabilities
Operating a 22+ VM home lab for attack simulation and detection engineering
Pursuing PSAA → PSAP → Security+ → CCDL1 → PAPA → PJPT → PNPT certification path
TryHackMe Top 1% - 270+ rooms completed (Inactive) Actively seeking SOC Analyst & Purple Team roles


$\color{Goldenrod}\Large{\textsf{What I Do}}$


$\color{Red}\normalsize{\textsf{Red Team}}$

  • Penetration Testing & Security Research
  • Red team operations & exploitation
  • Active Directory & Windows exploitation
  • Network security & privilege escalation

$\color{LightSkyBlue}\normalsize{\textsf{Blue Team}}$

  • Threat detection & incident response
  • SIEM analysis & log correlation
  • Threat hunting & malware analysis
  • Security monitoring & alerting

$\color{Goldenrod}\Large{\textsf{Featured Projects}}$


$\color{MediumOrchid}\large{\textsf{Nebula Forge Detection Suite v2}}$

All 19 tools are part of Nebula Forge — an open-source SOC platform covering the full workflow: Detect → Normalize → Hunt → Drift → Cluster → Simulate → Investigate → Respond → Report. The Detection Suite v2 9 tools run as a fully containerized stack — a single docker compose up -d starts all services with a shared Postgres backend. The dashboard (port 5010) provides live status, one-click launches, and pipeline monitoring across all 19 tools in the org.

Nebula Forge includes two automated pipelines:

  • Drift-scan — scheduled Sigma rule drift analysis across your detection library
  • Purple-loop — end-to-end purple team cycle: discover (VulnForge) → simulate (AtomicLoop) → detect (Wazuh/Splunk) → validate (DriftWatch) → hunt (HuntForge) | Pipeline validated end-to-end April 2026

$\color{green}\normalsize{\textsf{Detection Engineering}}$

Tool Description
SigmaForge Vendor-agnostic Sigma rule generator — Splunk SPL, Elastic KQL/EQL, Sentinel KQL, Wazuh XML, QRadar AQL, Detection-as-Code JSON
YaraForge YARA rule generator with ATT&CK mapping and detection dashboard
SnortForge Snort 2/3 rule generator with multi-content chaining, performance scoring, and 12 detection templates
Azure-SOC-mini-lab Azure cloud detection lab — 12 ATT&CK-mapped simulations, KQL detections, Sentinel playbooks
AWS-SOC-lab AWS cloud detection lab — CloudTrail detections, IAM/S3/EC2 attack simulations, GuardDuty integration

YaraForge - YARA Rule Generator & Testing Platform
Build, manage, test, and visualize YARA detection rules with MITRE ATT&CK mapping and a detection dashboard.
Python Flask YARA MITRE ATT&CK Detection Engineering

SnortForge - SnortForge - Snort IDS/IPS Rule Generator — Flask web app with multi-content chaining, Snort 2/3 syntax toggle, rule performance scoring, 12 detection templates, inline help tooltips, PCRE flag checkboxes, HTTP URI/Header matching, rule validation, and .rules file import/export. Dark-themed UI with real-time live preview. v1.2.0. Python Flask Snort IDS/IPS Network Security

SigmaForge — Vendor-Agnostic Sigma Rule Generator Custom conversion engine (no pySigma dependency) generating Sigma rules to 6 SIEM backends: Splunk SPL, Elastic KQL, EQL, Sentinel KQL, Wazuh XML, and QRadar AQL — plus Detection-as-Code JSON. MITRE ATT&CK mapping, 12 pre-built templates, rule library, and standalone CLI. Python Flask Sigma SIEM Detection Engineering CLI Python Flask Sigma SIEM Detection Engineering CLI

Azure-SOC-mini-lab — Azure Cloud Detection Lab KQL detections, attack simulations (12 MITRE ATT&CK techniques mapped), and IR documentation for the Azure control plane — identity, compute, and key vault planes. Built on Microsoft Sentinel / Log Analytics with anomaly-based detection, synthetic log samples, and an automated NSG response playbook. Azure KQL Microsoft Sentinel MITRE ATT&CK Detection Engineering Cloud Security

AWS-SOC-lab — AWS Cloud Detection Lab CloudTrail-based detections in CloudWatch Logs Insights and Athena SQL, attack simulations for IAM privilege escalation, credential exfiltration, S3 enumeration and public exposure, CloudTrail disable, and EC2 post-exploitation via SSM RunCommand — with GuardDuty finding integration, 5 IR reports, and a Lambda auto-response playbook. AWS companion to Azure-SOC-mini-lab. AWS CloudTrail GuardDuty CloudWatch Logs Insights Athena MITRE ATT&CK Detection Engineering Cloud Security

$\color{MediumOrchid}\normalsize{\textsf{Nebula Forge Detection Suite v2}}$

Tool Port Description
LogNorm 5006 ECS-lite log normalizer for disparate SIEM sources
HuntForge 5007 ATT&CK-mapped threat hunt playbook generator
DriftWatch 5008 Sigma rule drift analyzer — feeds the drift-scan pipeline
ClusterIQ 5009 Behavioral alert clustering engine for SOC triage noise reduction
AtomicLoop 5011 Atomic Red Team runner — feeds the purple-loop pipeline
VulnForge 5012 Exploit intel aggregator → ATT&CK mapping → pipeline trigger
WifiForge 5013 802.11 threat detector with deauth/rogue AP detection → LogNorm export

LogNorm - Log Source Normalizer (port 5006)
Normalizes log sources from disparate inputs into a consistent ECS-lite schema for downstream detection and analysis pipelines.
Python Flask Log Normalization ECS SIEM

HuntForge - MITRE ATT&CK Hunt Playbook Generator (port 5007)
Generates structured threat hunting playbooks mapped to MITRE ATT&CK techniques, providing analyst-ready queries and investigation checklists.
Python Flask MITRE ATT&CK Threat Hunting Detection Engineering

DriftWatch - Sigma Rule Drift Analyzer (port 5008)
Analyzes Sigma rule libraries for drift — identifying stale, misconfigured, or coverage-gapped rules over time. Feeds the drift-scan pipeline.
Python Flask Sigma Detection Engineering Rule Management

ClusterIQ - Contextual Alert Clustering Engine (port 5009)
Groups and contextualizes alerts using behavioral clustering to reduce noise and surface high-fidelity incident signals for SOC triage.
Python Flask Alert Clustering SOC Incident Response

AtomicLoop — Atomic Red Team Test Runner (port 5011) Executes Atomic Red Team tests in controlled loops for purple team validation, feeding results into the purple-loop pipeline for detection coverage measurement. Dedicated purple loop target: Win10x2 (Wazuh agent 005, AtomicLoop-Test). Python Flask Atomic Red Team Purple Team MITRE ATT&CK

VulnForge - Vulnerability & Exploit Intelligence Tool (port 5012)
Aggregates exploit intelligence from ExploitDB, NVD, and Metasploit, maps findings to MITRE ATT&CK techniques, and feeds results into the purple team pipeline — generating hunt playbooks, LogNorm-ready exports, and AtomicLoop simulation triggers from a single search.
Python Flask MITRE ATT&CK Vulnerability Intelligence Purple Team

WifiForge - Wireless Network Security Analyzer (port 5013)
Passively scans wireless networks, assesses security posture, detects deauth attacks and rogue configurations, maps findings to MITRE ATT&CK techniques, and exports results to the Nebula Forge LogNorm pipeline.
Python Flask Scapy Wireless Security MITRE ATT&CK

$\color{green}\normalsize{\textsf{Endpoint Security}}$

Tool Description
EndpointForge Cross-platform HIDS — process, FIM, network, registry, autoruns with Wazuh NDJSON export
EndpointTriage PowerShell IR artifact collector — processes, persistence, event logs, Sysmon, HTML report output

EndpointForge - Cross-Platform Endpoint Security Monitor
Host-based intrusion detection and endpoint triage across 5 modules: process execution, file integrity (SHA-256 FIM), network connections, registry persistence (Windows), and autoruns — all MITRE ATT&CK mapped. Includes Wazuh export integration: POST /api/wazuh/export writes NDJSON picked up by the Wazuh agent using bundled decoder and rules (IDs 100200–100265) with ATT&CK technique tags — no manual log shipping. Markdown/JSON report generation for IR workflows.
Python Flask MITRE ATT&CK HIDS Endpoint Security Wazuh

EndpointTriage - Windows Endpoint Forensic Artifact Collector
Automated PowerShell-based IR triage script that collects volatile and non-volatile forensic artifacts — running processes with hashes, network connections, registry persistence checks, scheduled tasks, event log extraction (Security, Sysmon, PowerShell, Defender), named pipe enumeration, and suspicious indicator flagging. Outputs a structured triage package with HTML summary report.
PowerShell Incident Response Forensics DFIR Endpoint Security

$\color{green}\normalsize{\textsf{Blue Team}}$

Tool Description
Log-Analyzer SOC-focused log analysis with pattern matching and anomaly detection
Phishing-Analyzer Email header and content analysis for phishing campaign identification
SIREN NIST 800-61 incident report generator with severity scoring, IOC tracking, and timeline management
Threat-Intel-Dashboard Real-time IOC tracking, feed aggregation, and visual analytics
Security-Awareness-Training Phishing simulation and training platform

Log-Analyzer - Security Log Analyzer
Python-based log analysis tool designed for SOC analysts with pattern matching and anomaly detection.
Python Flask SIEM Log Analysis SOC

Phishing-Analyzer - Phishing Email Analyzer
Email header and content analysis tool for identifying phishing campaigns and malicious indicators.
Python Email Security Phishing Detection Blue Team

Security-Awareness-Training - Security Awareness Platform
Enterprise-style platform with phishing simulations, training modules, and progress tracking.
Python Flask Security Training Phishing Simulation

$\color{green}\normalsize{\textsf{Threat Intelligence}}$

Tool Description
Threat-Intel-Dashboard Real-time IOC tracking, feed aggregation, and visual analytics for SOC operations

Threat-Intel-Dashboard - Threat Intelligence Dashboard
Real-time threat intelligence platform with IOC tracking, feed aggregation, and visual analytics for SOC operations.
HTML JavaScript Threat Intelligence OSINT SOC

$\color{green}\normalsize{\textsf{Incident Response}}$

Tool Description
SIREN NIST 800-61 incident report generator with severity scoring, IOC tracking, and timeline management

SIREN - Security Incident Response Engine & Notation
Professional incident report generator following NIST 800-61 framework with severity scoring, IOC tracking, timeline management, and Markdown/JSON export.
Python Flask NIST 800-61 Incident Response SOC

$\color{green}\normalsize{\textsf{Wireless Security}}$

Tool Description
Hidden-Rogue-AP-Detector Rogue AP detection via RSSI analysis with whitelist management
Wi-Fi-Probe-Request-Sniffer 802.11 probe request capture with MAC vendor ID and CSV/JSON export

Hidden-Rogue-AP-Detector - Rogue Access Point Detector Python-based wireless security tool for detecting unauthorized access points using RSSI signal strength analysis, whitelist management, and active/passive scanning modes. Python Scapy Wireless Security Network Monitoring Rogue AP Detection

Wi-Fi-Probe-Request-Sniffer - Wi-Fi Probe Request Analyzer Captures and analyzes wireless probe requests from nearby devices with SSID extraction, MAC vendor identification, and CSV/JSON export for network visibility and device enumeration. Python Scapy 802.11 Network Security Device Enumeration

$\color{green}\normalsize{\textsf{Offensive Security Tools}}$

Tool Description
SMB-RDP-Exploitation-Scanner SMB/RDP vulnerability scanner — EternalBlue, SMBGhost, BlueKeep, credential brute force
Network-Security-Toolkit PathFinder (attack path mapping) + PathGuard (defensive hardening) on shared NetworkMapper core

SMB-RDP-Exploitation-Scanner — SMB & RDP Vulnerability Scanner Python-based exploitation scanner for authorized penetration testing. Detects and validates SMB vulnerabilities (EternalBlue MS17-010, SMBGhost CVE-2020-0796, null session enumeration) and RDP vulnerabilities (BlueKeep CVE-2019-0708) with credential brute forcing, multi-format reporting (JSON/CSV/TXT), and threaded subnet scanning. Designed for Kali Linux. Python Penetration Testing SMB RDP Network Security Vulnerability Assessment

Network-Security-Toolkit — PathFinder & PathGuard Unified red/blue team network security toolkit built on a shared core library (NetworkMapper). PathFinder maps attack paths, lateral movement routes, and exfiltration channels with Shodan integration and MITRE ATT&CK coverage. PathGuard provides defensive choke point analysis, CIS/NIST-mapped hardening recommendations, baseline change detection, and a prioritized remediation roadmap. Python Red Team Blue Team Network Security MITRE ATT&CK Shodan PathFinder PathGuard


$\color{Goldenrod}\Large{\textsf{Current Focus}}$


  • Nebula Forge Detection Suite v2 — 9 tools containerized and live (LogNorm, HuntForge, DriftWatch, ClusterIQ, AtomicLoop, VulnForge, WifiForge + dashboard + Postgres) — single docker compose up -d
  • Purple team automation pipelines: drift-scan and purple-loop validated end-to-end April 2026
  • PSAP 2026 — SOC analyst and detection engineering roles, Tampa Bay market
  • Expanding Wazuh SIEM detections and Splunk correlation rules

$\color{Goldenrod}\Large{\textsf{Certifications}}$


In Progress:

  • 🔹 PSAA (Practical Junior Security Awareness Analyst) - 2026*
  • 🔹 PSAP (Practical SOC Analyst Professional) - Scheduled Q4 2026

Certification Roadmap: PSAA → PSAP → Sec+ → CCDL1 → PAPA → PJPT + PNPT


$\color{Goldenrod}\Large{\textsf{Lab Environments}}$


22+ VM Purple Team Lab:

  • Active Directory lab (attack & defense)
  • Snort IDS/IPS network monitoring
  • Web vulnerability testing environment
  • Malware analysis sandbox
  • WiFi penetration testing lab
  • Flipper Zero / Pwnagotchi
  • Wazuh SIEM with Sysmon integration & MITRE ATT&CK-mapped detections (5 agents: Windows, Linux)
  • Splunk Free on Ubuntu for detection and hunt workflows

$\color{Goldenrod}\Large{\textsf{Operating Systems}}$


Kali Linux Windows Ubuntu Debian


$\color{Goldenrod}\Large{\textsf{Security Tools}}$


$\color{red}\normalsize{\textsf{Offensive }}$ Burp Suite Nmap Metasploit Hashcat BloodHound CrackMapExec

$\color{CornflowerBlue}\normalsize{\textsf{Defensive }}$ Wireshark Wazuh Splunk Elastic Snort YARA Sysmon

$\color{CornflowerBlue}\normalsize{\textsf{Hardware }}$ Flipper Zero Pwnagotchi



Syntax Eyes

Breaking to Build. Defending to Endure.

image_alt

Pinned Loading

  1. Nebula-Forge Nebula-Forge Public

    Open-source detection engineering and IR platform for SOC analysts and purple teams.

    Python

  2. SigmaForge SigmaForge Public

    Vendor-Agnostic Sigma Rule Generator — Splunk SPL, Elastic KQL, Elastic EQL, Sentinel KQL

    Python

  3. HuntForge HuntForge Public

    MITRE ATT&CK Threat Hunt Playbook Generator — T-code → hypothesis, queries, artifacts | Part of Nebula Forge

    Python

  4. AtomicLoop AtomicLoop Public

    Atomic Red Team Test Runner & Detection Validator — execute, capture, validate | Part of Nebula Forge

    Python

  5. EndpointTriage EndpointTriage Public

    Automated forensic artifact collector for Windows endpoint incident response — process, network, persistence, event log, and registry triage with MITRE ATT&CK mapping and HTML reporting

    PowerShell

  6. EndpointForge EndpointForge Public

    Cross-platform endpoint security monitor with MITRE ATT&CK mapping — process analysis, file integrity monitoring, network connection mapping, and persistence detection for Windows and Linux

    Python