- Clandestine Platform
The Clandestine Platform is a proof-of-concept framework designed for organizations to conduct offensive cybersecurity operations, focusing on attribution evasion and anonymity preservation. It aims to assist security researchers, penetration testers, and cybersecurity professionals in understanding and defending against threat actors by replicating their capabilities.
- Centralized Intranet Platform: Based on the MITRE ATT&CK Framework.
- Privacy and Security: Built for secure and discreet collaboration.
- Advanced Analytics: Integrates AI/ML for enhanced operational insights.
- Mix Networks: Uses Tor, I2P, and other networks to protect operators.
- Lightweight UI: Optimized for speed and performance using Pure CSS and HTMX.
- Litestar Vite Integration
- Jinja2 Templates
- Svelte
- Shadcn UI Componenets Ported to Svelte
- Tailwind CSS
- Docker-based scripts
- Project Discovery Tools
- Network Scanning
- Privacy & Security: Ensure a secure platform for offensive operations and reconnaissance.
- Ease of Use: Simple and intuitive interface for ease of use.
- Discreet Collaboration: Secure and private collaboration features.
- Avoid exposing the dashboard UI to the public internet.
- Utilize mix networks and proxychains for secure access.
- Use Docker containers for isolation.
- OnionCat: VPN over Tor and I2P.
- HeadScale / Tailscale: Easy-to-use VPN services.
- Tor Hidden Services: Expose services without revealing IP addresses.
- Yggdrasil Services: Decentralized networking.
-
Mix Networks: Use as first hop in proxychains.
- Torsocks
- Nym Mixnet
- Arti
- Lokinet
-
Networking Tools:
- Proxychains4
- Wireguard
- SSHuttle
- Docker Containers (e.g., Tor-Privoxy)
- Sporestack for hosting
- Wizard Swap for crypto swaps
- Minimize HTML view sizes for efficient delivery over Tor.
- Focus on reactivity using Svelte components.
- Implement secure JavaScript practices.
- Real-Time Data: Use Litestar Websockets.
- Component-Oriented: Break views into Svelte components.
- Optimized Performance: Lightweight and efficient components.
To Do
- Access the Application:
- The application should now be running and accessible through the specified network setup.
-
Accessing the Dashboard:
- Authenticate at the root route.
- Use the vertical navigation bar for application functionality.
- Use the horizontal navigation bar for platform settings and management.
-
Data Ingestion and Analysis:
- Follow guidelines in the documentation for detailed usage instructions.
Contributions are welcome! Please read the contributing guidelines for more information.
For more information, issues, or feedback, please contact us at [email protected].