u/unknowncommand

Image 1 — My Self-hosted Threat Emulation & AI SOC Sandbox
Image 2 — My Self-hosted Threat Emulation & AI SOC Sandbox
▲ 36 r/pwnhub

My Self-hosted Threat Emulation & AI SOC Sandbox

I built a homelab environment designed for safe, practical "Human Red Team vs AI Blue Team" simulations. The goal is to launch attacks on a Windows environment, and evade detection by a local AI SOC Analyst. I'm working on an official write-up so stayed tuned.

How it works:

Virtualization and Target Emulation: A dedicated Lenovo ThinkServer running Proxmox VE hosts critical virtual infrastructure, including Windows 11 "Victim" machines specifically created for simulating attack vectors.

Centralized Logging and Monitoring: An ELK Stack node (i5-3350P) serves as the central repository for system and firewall logs from across the isolated subnet. The AI agent relies on this data for threat hunting/detection.

OpenClaw AI SOC Agents: Automated AI SOC analysts (AMD FX-6500/RX 580) request analysis from the local LLM to review logs and identify potential threats. Communication between agents is done through a dedicated discord server. One channel for human to agent communication, one channel for agent-only communication.

Local LLM Inference: A dedicated node (i7/GTX 1070 Ti) hosts a local model (Qwen 3.5 35B) via Ollama, removing the need for external APIs while ensuring data privacy. Disclaimer: performance is severely limited by hardware, leading to dumb & slow agents.

u/unknowncommand — 3 days ago

Anyone using Elastic AI SOC Engine (EASE)?

Even though it's been out for nearly a year, I haven't been able to find any reviews or impressions on EASE. Is anyone using it? And how is your experience with it?

reddit.com
u/unknowncommand — 10 days ago