What is OPFORGE?
OPFORGE stands for Offensive Posture + FORensics + Generation & Engineering. It’s a purpose-built cybersecurity lab environment designed to:
- 🛠️ Emulate adversary behavior
- 🔍 Ingest and enrich telemetry from Windows and Linux endpoints
- 🧠 Apply explainable AI to triage and surface detections
- 📚 Document real-world operator workflows
Whether you’re reverse-engineering a malware sample, developing YARA rules, or building detection pipelines with SOF-ELK, OPFORGE is designed to mirror the complexity and realism of mission-ready cyber defense.
Mission Goals
Threat Emulation
- Use Atomic Red Team, Caldera, and custom payloads to simulate known TTPs.
Detection Engineering
- Build, test, and validate detection logic using tools like Winlogbeat, Sysmon, and ELK.
Explainable AI
- Incorporate open-source ML models for clustering, classification, and triage augmentation with transparency and traceability.
Documentation
- Share the setup process, automation, infrastructure, and detection results in a Check–Do–Check blog series.
Who’s Behind It?
OPFORGE is developed and maintained by Alfredo Pelaez, a cybersecurity leader focused on threat detection, adversary emulation, and applied research. His work blends operational experience with a strong foundation in machine learning and cyber defense strategy to build meaningful, mission-ready solutions.
Want to Contribute or Reproduce?
- Visit the GitHub Repo
- Fork the blog series and lab setup documentation
- Suggest topics or TTPs you’d like to see emulated
Built using Hugo + PaperMod + GitHub Pages Hosted on opforge.dev