Skip to content

404saint/network-research

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

12 Commits
Β 
Β 
Β 
Β 

Repository files navigation

Network Research Labs

Wireshark Kali Linux Linux Python Graphviz

A collection of network research experiments and lab setups by RUGERO Tesla (404saint).
Focused on exploring constrained network environments, routing pivots, and application-layer traffic analysis.


πŸ”Ή Featured Labs

Lab Name Description
ADB Userspace VPN Pivot Reverse tethering using ADB and SOCKS5h to route PC traffic through a mobile VPN.
(Future labs) Additional network experiments exploring constrained routing, traffic pivots, and application-layer analysis.

Repository Structure (for Labs)


network-research/
β”‚
β”œβ”€ lab-setup/               # Environment setups and reproducibility notes
β”œβ”€ methodology/             # Problem analysis, design decisions, implementation, technical breakdown
β”œβ”€ security-considerations/ # Defensive and ICS/OT perspective
β”œβ”€ references/              # Technical notes, RFCs, documentation
└─ diagrams/                # Architecture diagrams and flowcharts


βš™οΈ Tools & Techniques

  • Linux/Windows hosts for testing
  • Network proxies, port forwarding, and tunneling techniques
  • Application-layer pivoting and constrained routing
  • Packet inspection, traffic analysis, and validation tools
  • Diagramming with Graphviz/DOT

πŸ“Œ Notes

  • Labs are reversible and safe, designed for research purposes.
  • Focus is on understanding network behavior under constraints, not bypassing security controls.
  • Suitable for ICS/OT-inspired research and general network experimentation.

πŸ› οΈ Contributing / Adding New Labs

This repository is designed to grow with new network research experiments. To add a lab:

  1. Create a dedicated directory for the lab:

network-research/<lab-name>/

  1. Include the following structure:

lab-setup/               # Environment setup & prerequisites
methodology/             # Problem analysis, design, implementation
security-considerations/ # Defensive insights & ICS/OT perspective
references/              # Documentation, RFCs, technical notes
diagrams/                # Architecture or flow diagrams

  1. Include a brief description in the README.md of the lab folder.
  2. Use clear naming for files and directories to maintain consistency.
  3. Ensure all experiments are reversible, safe, and for research purposes only.

Contributions should follow these guidelines to maintain clarity, reproducibility, and research integrity.


Contact


Industrial & Network Security | Offensive Security Research | ICS/OT-focused

About

Applied network research: tunneling, pivoting, and architectural experiments for offensive and defensive insights.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors