the work speaks first. identity follows.
Building adversarial infrastructure from the ground up. Network deception, LLM security tooling, payload mutation engines — everything here started as a problem that needed solving and no existing tool that solved it.
Self-taught. Local-first. No lab access, no team, no institutional backing. Just friction and the tools built to remove it.
Part of the badBANANA collective — a one-person operation that treats security research as a craft, not a career move.
The BANANA_TREE is an adversarial training loop. Every tool feeds the next.
OBSERVE SIMULATE
LANimals ─ network deception Lune ─ 64-module tradecraft
OpenSight ─ OSINT / graphs PHANTOM ─ honeypot detection
TERRAIN ─ local intelligence SHENRON ─ payload mutation
EXECUTE ADAPT
zer0DAYSlater ─ post-exploit drift_orchestrator ─ LLM drift
LANIMORPH ─ adaptive morph chain ─ mutation lineage
OWN ─ execution layer aliasOS ─ operator shell
observe → simulate → execute → adapt → observe
Nothing here is speculative. Every tool in the map is operational.
| tool | what it does |
|---|---|
| LANimals | Local network deception platform. Discovers hosts, scores behavioral risk, deploys honeypot traps, assigns adversarial personalities to targets, force-directed graph UI. |
| Lune | 64-module adversary simulation framework. Encrypted C2, LLM mutation engine, unified persona system, pre-built operation chains. |
| zer0DAYSlater | Post-exploitation framework. LLM operator, session drift monitoring, entropy capsule, mTLS mesh with ephemeral NaCl keypairs. |
| drift_orchestrator | Runtime drift control for LLM sessions. SQLite flight recording, semantic embeddings, composite density scoring, hysteresis policy engine. |
| OpenSight | Document intelligence and OSINT platform. Entity extraction, typed knowledge graph, investigation bundles, demonstrated on FBI corpus. |
| SHENRON | Polymorphic payload framework. 49-layer mutation engine recovered and rebuilt from scratch. |
| LANIMORPH | LAN-aware morphing payload system. Per-subnet XOR mutation, personality-driven selection, sealed mesh exports. |
| PHANTOM | Honeypot fingerprinting layer. Identifies Cowrie, Kippo, OpenCanary, Thinkst and 4 others. Extends Decoy-Hunter. |
| chain | Mutation engine and lineage tracker. DNA-style payload evolution with XP system and replay. |
| aliasOS | Textual TUI for managing 296 operator shell aliases. Browse, CRUD, health check, history mining, gap analysis. |
VERIFIED // GnomeMan4201
──────────────────────────────────────────────────────────────────
GitHub Stars 34 across 20 public repos
GitHub Forks 3 zer0DAYSlater ×2
Followers 76 organic
Contributions 752 last 12 months
──────────────────────────────────────────────────────────────────
Dev.to Articles 28 gnomeman4201
Dev.to Views 4,188 total reads
──────────────────────────────────────────────────────────────────
Lune Tests 92 passing — CI green
OpenSight Tests 52 passing — CI green
aliasOS v1.0.0 296 aliases · live demo
──────────────────────────────────────────────────────────────────
every number above is verifiable.
──────────────────────────────────────────────────────────────────
methodology: necessity-driven development
build when friction exceeds build cost
publish when the work can stand alone
──────────────────────────────────────────────────────────────────
| repo | build |
|---|---|
| LANimals | |
| Lune | |
| drift_orchestrator | |
| zer0DAYSlater | |
| OpenSight | |
| chain | |
| aliasOS |
dev.to/gnomeman4201 — 28 articles. Adversarial tooling, LLM security, network deception, platform analysis, and the philosophy behind building in the open under a pseudonym.
preferred: GitHub issues / security advisories
writing: dev.to/gnomeman4201
PGP: 324C 4301 54C2 3C8E 3956 1B10 0CFD 6761 AA75 4969
github.com/GnomeMan4201.gpg



