Building security automation that actually gets deployed — not just demo'd.
Six tools. One workflow. Built from scratch.
%%{init:{"flowchart":{"wrappingWidth":250,"nodeSpacing":40,"rankSpacing":50}}}%%
graph TD
A["🔍 OSINT-Leak-Radar"] --> C["🔬 forensic-timeline-builder"]
B["📡 wifi-security-auditor"] --> C
C --> D["⚡ soar-engine"]
D --> E["🩹 Auto-Patch-AI"]
D -.->|always on| F["📊 cve-watch"]
style A fill:#0d1117,stroke:#00ff41,color:#00ff41
style B fill:#0d1117,stroke:#00ff41,color:#00ff41
style C fill:#0d1117,stroke:#58a6ff,color:#58a6ff
style D fill:#0d1117,stroke:#f85149,color:#f85149
style E fill:#0d1117,stroke:#3fb950,color:#3fb950
style F fill:#0d1117,stroke:#d29922,color:#d29922
| Stage | Tool | What it does |
|---|---|---|
| 🔍 Recon | OSINT-Leak-Radar | Queries Wayback Machine CDX for .env files, SQL dumps, and private keys crawled years ago |
| 📡 Audit | wifi-security-auditor | WPA/WPA2 audit — OUI vendor lookup, WPS detection, PMKID capture without deauthentication |
| 🔬 Investigate | forensic-timeline-builder | SSH log collection → unified timeline → auto-detection of brute force and privilege escalation |
| ⚡ Respond | soar-engine | FastAPI webhook → Redis queue → Celery workers. Async playbooks: VirusTotal enrichment + firewall block + Slack |
| 🩹 Patch | Auto-Patch-AI | Trivy scans container → LLM (Groq free / OpenAI) writes patched Dockerfile. Free to run. |
| 📊 Monitor | cve-watch | NVD + EPSS enrichment. Ranks by cvss × exploit_probability — not just severity theatre |


