Skip to content
View GnomeMan4201's full-sized avatar
💭
always breaking things
💭
always breaking things

Block or report GnomeMan4201

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
GnomeMan4201/README.md

Typing SVG

 ██████╗ ███╗   ██╗ ██████╗ ███╗   ███╗███████╗███╗   ███╗ █████╗ ███╗   ██╗██╗  ██╗██████╗  ██████╗  ██╗
██╔════╝ ████╗  ██║██╔═══██╗████╗ ████║██╔════╝████╗ ████║██╔══██╗████╗  ██║██║  ██║╚════██╗██╔═══██╗███║
██║  ███╗██╔██╗ ██║██║   ██║██╔████╔██║█████╗  ██╔████╔██║███████║██╔██╗ ██║███████║ █████╔╝██║   ██║╚██║
██║   ██║██║╚██╗██║██║   ██║██║╚██╔╝██║██╔══╝  ██║╚██╔╝██║██╔══██║██║╚██╗██║╚════██║██╔═══╝ ██║   ██║ ██║
╚██████╔╝██║ ╚████║╚██████╔╝██║ ╚═╝ ██║███████╗██║ ╚═╝ ██║██║  ██║██║ ╚████║     ██║███████╗╚██████╔╝ ██║
 ╚═════╝ ╚═╝  ╚═══╝ ╚═════╝ ╚═╝     ╚═╝╚══════╝╚═╝     ╚═╝╚═╝  ╚═╝╚═╝  ╚═══╝     ╚═╝╚══════╝ ╚═════╝  ╚═╝
                                                    // LANimals collective — gnomeman4201

Operator Focus Status


GitHub Streak

"Let the work speak first. Identity follows."


$ cat ./BANANA_TREE/architecture.txt

┌─────────────────────────────────────────────────────────────────┐
│                    BANANA_TREE  //  GnomeMan4201                 │
│              adversarial intelligence ecosystem                  │
└─────────────────────────────────────────────────────────────────┘

  ◉ OBSERVE                    ◈ SIMULATE
  ├── LANimals Nexus            ├── Lune (64 modules)
  │   adaptive deception        │   operator tradecraft
  ├── OpenSight                 └── Decoy-Hunter
  │   entity graphs / OSINT         deception detection
  └── TERRAIN
      local OSINT / SearxNG     ◆ EXECUTE
                                ├── zer0DAYSlater
  ◎ ADAPT                      │   exploit framework
  ├── drift_orchestrator        └── Blackglass Suite
  │   LLM drift control             offensive tooling
  ├── aliasOS
  │   operator shell TUI        ── cross-cutting ──
  ├── chain                     aliasOS  →  all tools
  │   mutation engine           drift    →  all sessions
  └── reflexive-identity        chain    →  all payloads
      stylometric ops

  observe → simulate → execute → adapt → observe

The full ecosystem map — how every tool connects, the adversarial training loop, and the philosophy behind it all.

BANANA_TREE


$ cat /etc/skills

Python Shell FastAPI SQLite Linux HTML Networking OSINT

DOMAIN                  DEPTH        NOTES
─────────────────────────────────────────────────────────────────
Adversarial Simulation  █████████░   Lune — 64-module tradecraft lib
Network Deception       ████████░░   LANimals — adaptive honeypot engine
OSINT / Intel           ████████░░   OpenSight — entity graphs, bundles
Python / FastAPI        ████████░░   production local-first backends
Adversarial AI / LLM    ███████░░░   prompt-space ops, mutation engines
C2 Infrastructure       ███████░░░   AES-128-CBC, hardened beacon cycle
System Administration   ██████░░░░   multi-site infra, self-taught
Threat Detection        ██████░░░░   risk scoring, behavioral analytics

$ cat ./methodology.txt

RESEARCH APPROACH // GnomeMan4201
──────────────────────────────────────────────────────────────────
01  NECESSITY-DRIVEN         build because friction exists, not speculatively
02  LOCAL-FIRST              no cloud dependencies, no external attack surface
03  CONTROLLED ANONYMITY     identity follows work, not the other way around
04  ADVERSARIAL TESTING      every defensive tool built by thinking offensively
05  PUBLIC VERIFICATION      every claim above is checkable — no vaporware
06  OPEN SOURCE CORE         infrastructure public, operations private
──────────────────────────────────────────────────────────────────
tooling philosophy: if you need it twice, alias it.
                    if you need it daily, build it.
                    if it exposes a gap, publish it.

$ ls -la ./projects/

each tool exists because the previous one exposed a gap. the ecosystem builds on itself. nothing here is speculative.

🔴 Lune

Modular Adversary Simulation & Live Deception Framework

64-module tradecraft library. LLM-powered mutation engine. Pre-built operation chains. Encrypted C2 infrastructure (AES-128-CBC + HMAC-SHA256). Unified persona system. Hardened agent with encrypted beacon/report cycle. Built for operators who need real deception capability — not demos.

stack:   Python · MIT licensed · CI passing
modules: tradecraft/ · deception/ · C2/ · agents/ · chainforge/
status:  active — authorized red team ops and controlled lab simulation only

Lune


🔴 LANimals

Adaptive Deception Intelligence Platform

Local network intelligence and active deception system. SQLite persistence, honeypot trap engine, behavioral risk scoring, force-directed graph UI. See what's moving on your network — and make it regret it.

stack:   Python · FastAPI · SQLite · D3.js · SQLAlchemy
status:  active development

LANimals


🔴 OpenSight

Document Intelligence & OSINT Platform

Entity extraction, typed knowledge graph, community detection, LLM summaries, investigation bundle system with .osight export/import. Demonstrated on FBI document corpus.

stack:   Python · FastAPI · SQLAlchemy · Canvas API · SQLite
status:  active development

OpenSight


🔴 PHANTOM

Deception Intelligence Layer for Decoy-Hunter

Honeypot platform fingerprinting (Cowrie, Kippo, OpenCanary, Thinkst, HoneyD, Dionaea), deception topology mapping, and counter-playbook generation. Extends Decoy-Hunter with actionable intelligence.

stack:   Python · regex signatures · LANimals integration
status:  active development

PHANTOM


🔴 zer0DAYSlater  ·  🔴 Blackglass Suite  ·  🔴 Decoy-Hunter

zer0DAYSlater Blackglass Decoy-Hunter chain


🔴 bad_BANANA

Field-Ready Mobile Offensive Toolkit

No-root offensive toolkit for Android (Termux) and Linux. Multi-stage dropper chain, covert exfil over DNS/HTTPS/WebSocket, Chromium session extraction, EDR-aware launcher. Operates entirely from a mobile device.

role:    mobile simulation layer — extends the environment off-network
stack:   Python · Shell · Termux
status:  active — authorized lab environments only

bad_BANANA

🟢 aliasOS  ·  🔴 reflexive-identity  ·  🔴 devto-bot-audit  ·  🔴 pwn  ·  🔴 drift-artifact

[REDACTED] aliasOS reflexive-identity devto-bot-audit pwn drift-artifact


$ tail -f ./writing/dev.to

Writing as gnomeman4201 on DEV.to

· Operating in Prompt Space: Red Teaming the Control Plane of an LLM
· LANimals — building deception infrastructure for local networks
· The Name Did the Talking  [WeCoded 2026]
· devto-analytics-pro — presence tracking for the terminal-minded
· aliasOS — managing 300 operator shell aliases with a Textual TUI

DEV.to


$ ./visualize --contributions

contribution snake

$ cat ./signals.txt

VERIFIED SIGNALS // GnomeMan4201
==============================================================
GitHub Stars                33        across 19 public repos
GitHub Forks              3        zer0DAYSlater x2
Followers                   76        organic
Contributions              679        last 12 months
--------------------------------------------------------------
Dev.to Articles          28        gnomeman4201
Dev.to Views          3,948        total reads
Bot Audit Finding       43%        bots detected in DEV ecosystem
--------------------------------------------------------------
Lune Tests               92        passing -- CI green
OpenSight Tests          52        passing -- CI green
PHANTOM Tests            20        passing -- 0 external deps
aliasOS release       v1.0.0        296 aliases · 7 tabs · live demo
--------------------------------------------------------------
every number above is verifiable.
--------------------------------------------------------------
aliasOS installs      live          gnomeman4201.github.io/aliasOS
drift sessions        active        runtime verified LLM analysis
LANimals deployments  local         authorized environments only
--------------------------------------------------------------
methodology: necessity-driven development (NDD)
             build when friction exceeds build cost
==============================================================
last updated: 2026-04-01T15:31:15Z
==============================================================


$ cat ./SECURITY.md

RESPONSIBLE DISCLOSURE // GnomeMan4201
──────────────────────────────────────────────────────────────────
scope:     all public repositories under GnomeMan4201
contact:   encrypted contact preferred (see below)
response:  acknowledgement within 72h
policy:    coordinated disclosure — 90 day window before public
reward:    credit in release notes + acknowledgement in README
out of scope: social engineering, physical attacks, DoS
──────────────────────────────────────────────────────────────────
for critical findings in LANimals, Lune, or drift_orchestrator:
contact via GitHub security advisory (private channel)

Security Policy

$ cat ./contact.txt

CONTACT // GnomeMan4201
──────────────────────────────────────────────────────────────────
preferred:    GitHub issues / security advisories
writing:      dev.to/gnomeman4201
collective:   LANimals — github.com/GnomeMan4201
──────────────────────────────────────────────────────────────────
PGP:          324C 4301 54C2 3C8E 3956 1B10 0CFD 6761 AA75 4969
              add pubkey to: github.com/GnomeMan4201.gpg
──────────────────────────────────────────────────────────────────
note: identity is managed deliberately.
      the work is public. the operator is not.

$ systemctl status --all

$ neofetch --minimal

         GnomeMan4201@github
         ──────────────────
OS:      Pop!_OS // gnomeman4201
Stack:   Python · Shell · FastAPI · SQLite
Age:     4.2 years on platform
Org:     LANimals collective
Tools:   aliasOS · drift_orchestrator · chain
Handle:  gnomeman4201
bad_BANANA end of file

GitHub followers GitHub stars

visitors

© badBANANA collective // LANimals

Pinned Loading

  1. zer0DAYSlater zer0DAYSlater Public

    Operator-controlled post-exploitation framework — local LLM interface, session drift monitoring, entropy tracking, feedback-driven mutation, NaCl mTLS mesh

    Python 2 2

  2. aliasOS aliasOS Public

    Textual TUI for managing operator shell aliases — browse, CRUD, health check, history mine, gap analysis

    Python

  3. drift_orchestrator drift_orchestrator Public

    Runtime drift control and hallucination verification for LLM session analysis

    Python

  4. BANANA_TREE BANANA_TREE Public

    adversarial training ecosystem — good defense is good offense

    1

  5. LANimals LANimals Public

    LANimals is a terminal based network discovery and auditing toolkit that visualizes your LAN in real-time. From reconnaissance to threat detection, it brings essential tools together with minimal o…

    Python 5 1

  6. Lune Lune Public

    Modular adversary simulation and red team operations framework. For controlled environments, research, and education only.

    Python 6