Skip to content

Rootless-Ghost/Nebula-Forge

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Nebula Forge

Open-source detection engineering and incident response tooling for SOC analysts and purple teams.

Built by a Navy veteran transitioning into cybersecurity — every tool in this org solves a real problem a SOC analyst faces daily. Not tutorial projects. Working tooling.


What is Nebula Forge?

Nebula Forge is a detection engineering and IR platform covering the full SOC workflow. Each tool occupies a defined lane — from writing detection rules to collecting forensic evidence to generating incident reports. The flagship capability is the closed-loop validation pipeline between SigmaForge and EndpointForge: rules authored in SigmaForge deploy as native Wazuh XML and get validated against live endpoint telemetry from EndpointForge — closing the gap between writing a detection and knowing it actually works.


Dashboard

6/6 tools online — live status, pipeline activity, and incident report viewer.

Nebula Forge Dashboard

The pipeline

%%{init: {'theme': 'dark', 'themeVariables': {'clusterBkg': '#1a1a2e', 'clusterBorder': '#444', 'titleColor': '#ffffff'}}}%%
flowchart LR
    subgraph Detect
        SF[SigmaForge v2\nDetection rule authoring]
        YF[YaraForge\nFile-based signatures]
        SNF[SnortForge\nNetwork signatures]
        EF[EndpointForge\nRuntime telemetry]
    end

    subgraph Investigate
        ET[EndpointTriage\nForensic collection]
        DV[Detection validation\nSigma → Wazuh → live]
    end

    subgraph Respond
        IR[IR triage\nContain and mitigate]
    end

    subgraph Report
        SR[SIREN\nIR report generation]
    end

    subgraph Pipelines
        TI[Threat Intel Dashboard\nIOC enrichment]
        DP[detection-pipeline\nIOC → rules]
        IC[ir-chain\nAutomated IR]
    end

    ND[nebula-dashboard\nCentral hub]

    SF -->|Wazuh XML rules| DV
    EF -->|Live telemetry| DV
    EF -->|Run Full Triage| ET
    DV -->|Detection gap| SF
    ET --> IR
    IR --> SR

    TI -->|Enriched IOCs| DP
    DP -->|Sigma rules| SF
    DP -->|YARA rules| YF
    DP -->|Snort rules| SNF

    ET -->|Triage output| IC
    ET -->|Log analysis| IC
    IC -->|Incident payload| SR

    ND -->|monitors| SF
    ND -->|monitors| YF
    ND -->|monitors| SNF
    ND -->|monitors| EF
    ND -->|monitors| TI
    ND -->|monitors| SR
    ND -->|monitors| DP
    ND -->|monitors| IC

    classDef detect     fill:#1e3a5f,stroke:#2a5a9f,color:#fff
    classDef investigate fill:#3a1e5f,stroke:#5a2a9f,color:#fff
    classDef respond    fill:#5f1e1e,stroke:#9f2a2a,color:#fff
    classDef report     fill:#1e5f3a,stroke:#2a9f5a,color:#fff
    classDef pipeline   fill:#1e4a4a,stroke:#2a7a7a,color:#fff
    classDef hub        fill:#5f4a1e,stroke:#9f7a2a,color:#fff

    class SF,YF,SNF,EF detect
    class ET,DV investigate
    class IR respond
    class SR report
    class TI,DP,IC pipeline
    class ND hub

    linkStyle 0,1,2 stroke:#bc8cff,stroke-width:2px
    linkStyle 3 stroke:#f0883e,stroke-width:2px
    linkStyle 7,8,9 stroke:#58a6ff,stroke-width:2px
    linkStyle 10,11,12 stroke:#39c5bb,stroke-width:2px
    linkStyle 13,14,15,16,17,18,19,20 stroke:#6e7681,stroke-width:1px

Loading

Tools

Tool Purpose Phase Stack
SigmaForge v2 Custom Sigma conversion engine — 6 query backends (Splunk SPL, Elastic KQL, EQL, Sentinel KQL, Wazuh XML, QRadar AQL) plus Detection-as-Code JSON; no pySigma dependency Detect Flask, Python, CLI
YaraForge YARA rule builder with SQLite storage, live file scanning via yara-python, MITRE ATT&CK tagging, and bulk import/export Detect Flask, Python, SQLite
SnortForge Snort 2 and Snort 3 rule generator with multi-content chaining, PCRE support, and a 0–100 performance scorer with letter grade and actionable tips Detect Flask, Python, CLI
EndpointForge Cross-platform HIDS with five scan modules — processes, network connections, filesystem integrity, registry (Windows), and persistence — MITRE ATT&CK mapped, with Wazuh log export Detect Flask, Python, CLI
EndpointTriage PowerShell forensic collector — 13 artifact categories (processes with hashes, network, scheduled tasks, registry persistence, event logs, DNS cache, named pipes, ARP, and more), outputs CSV/TXT files and a consolidated HTML report Investigate PowerShell
SIREN NIST 800-61 IR report builder with timeline events, IOC and affected-system tracking, composite severity scoring (0–10), and Markdown/JSON export Report Flask, Python
ir-chain Automated IR pipeline — connects EndpointTriage, log-analyzer, and SIREN into a single zero-touch workflow; watches for new triage output, runs log analysis, and POSTs a structured incident payload to SIREN; --purge-processed flag deletes processed case folders older than a configurable retention window (default 30 days) Integrate Python, CLI
detection-pipeline IOC-to-rule automation — enriches indicators via Threat Intel Dashboard, filters by risk score, and fans out to SigmaForge, YaraForge, and SnortForge simultaneously to generate Sigma, YARA, and Snort rules in a single command Detect Python, CLI
nebula-dashboard Central hub — live online/offline status for every Nebula Forge tool, one-click launch buttons, pipeline activity panels for ir-chain and detection-pipeline, SIREN incident report viewer (click any report to see full timeline, IOCs, affected systems, and recommendations), and a live countdown timer showing seconds until the next auto-refresh Operate Flask, Python
Log Analyzer CLI tool for parsing Windows Security Event Log (CSV) and Linux auth.log; detects brute force (4625), off-hours logins (4624), privilege escalation (4728/4732/4756), and account lockouts (4740) Detect Python
Phishing Analyzer CLI tool for analyzing .eml files; checks SPF/DKIM/DMARC, From/Reply-To mismatch, suspicious URLs (shorteners, TLDs, IP-based), dangerous attachments, and urgency keywords; scores suspicion 0–100 Detect Python
Threat Intel Dashboard IOC reputation lookup for IPs, domains, file hashes, and URLs; queries VirusTotal and AbuseIPDB with auto-type detection; demo mode when no API keys are configured Detect Flask, Python
Security Awareness Training Multi-user web app with training modules, quizzes (70% pass threshold), phishing simulation scenarios with red-flag walkthroughs, and an admin dashboard for tracking user progress Training Flask, Python

Architecture

Every tool in Nebula Forge shares the same foundation:

  • Flask web UI with a consistent dark theme
  • Python CLI engine for scripting and automation
  • MITRE ATT&CK mapping across detections and findings
  • Wazuh integration where applicable — decoders, rules, and exporters

The SigmaForge ↔ EndpointForge cross-link uses a custom Sigma conversion engine — no pySigma dependency, which has no native Wazuh backend. Rules generated by SigmaForge are valid Wazuh XML out of the box.


Home lab

All tooling is validated against a live environment:

  • Wazuh server — 192.168.46.100, v4.14.4
  • Agents — Win11x01 (windows), SOC101-Ubuntu (linux), Kali-Purple (offensive), Nebula-C (offensive)
  • Sysmon — SwiftOnSecurity config deployed on Win11x01

Built by

Rootless-Ghost — Navy Corpsman, SOC analyst in training, purple team practitioner. Targeting SOC analyst and detection engineering roles in the Tampa Bay market.

PSAA → PSAP → Sec+ → CCDL1 → PAPA → PJPT + PNPT


Nebula Forge — detection engineering tooling that works in the real world.

About

Open-source detection engineering and IR platform for SOC analysts and purple teams.

Topics

Resources

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors