Furulie LLC · FLLC.net · Arsenal Doctrine v2.5
TOOLSTACK
Futuristic · Modern · Legacy · Phase-Mapped — 85 Entries
85 / 85 ENTRIES VISIBLE
TOOL DOCTRINE v2.5 — FULL INDEX
#001
futuristic
LoRa Mesh Satellite Relay
RF / Space
Sub-GHz LoRa nodes relayed through LEO cubesats — off-grid comms with zero infrastructure dependency.
TOOL DOCTRINE v2.5 — FULL INDEX
#002
futuristic
Software-Defined Radio (GNU Radio)
RF Intelligence
Build custom radio receivers, demodulators, and spectrum analyzers in software. Passive intercept and signal mapping.
TOOL DOCTRINE v2.5 — FULL INDEX
#003
futuristic
Flipper Zero
Multi-Tool / Pentesting
Sub-GHz, NFC, RFID, IR, iButton, and BadUSB in a pocket hacking multi-tool. Red team field staple.
TOOL DOCTRINE v2.5 — FULL INDEX
#004
futuristic
OpenBTS / OsmocomBB
Cellular Emulation
Build rogue GSM base stations for testing. Run your own mobile network on commodity hardware.
TOOL DOCTRINE v2.5 — FULL INDEX
#005
futuristic
RTLSDR + Dump1090
Aviation OSINT
Passive ADS-B aircraft tracking from a $25 USB dongle. Real-time airspace situational awareness.
TOOL DOCTRINE v2.5 — FULL INDEX
#006
futuristic
BladeRF / HackRF One
RF Dev Platform
Full-duplex SDR transceiver for jamming research, replay attacks, and spectrum analysis labs.
TOOL DOCTRINE v2.5 — FULL INDEX
#007
futuristic
Raspberry Pi Zero W Dropbox
Implant Platform
Concealable always-on implant for remote tunneling, traffic capture, and C2 beaconing during physical ops.
TOOL DOCTRINE v2.5 — FULL INDEX
#008
futuristic
Coreboot + ME_Cleaner
Firmware Security
Replace proprietary BIOS and disable Intel ME. Verifiable open firmware chain for high-trust systems.
TOOL DOCTRINE v2.5 — FULL INDEX
#009
futuristic
Tails OS
Amnesic OPSEC OS
Live OS that leaves no trace. Routes all traffic through Tor. Required baseline for sensitive analyst workflows.
TOOL DOCTRINE v2.5 — FULL INDEX
#010
futuristic
UEFI Rootkit Detection (CHIPSEC)
Firmware Forensics
Intel's own framework for auditing UEFI, SPI flash, and platform security configurations.
TOOL DOCTRINE v2.5 — FULL INDEX
#011
futuristic
Starlink Emergency Kit
Resilient Comms
Portable satellite uplink for field ops and disaster-resilient NOC fallback. 100+ Mbps anywhere in the sky.
TOOL DOCTRINE v2.5 — FULL INDEX
#012
futuristic
DragonOS
RF / SIGINT OS
Debian-based live OS pre-loaded with SDR tools, decoders, and signal analysis suites for field SIGINT.
TOOL DOCTRINE v2.5 — FULL INDEX
#013
futuristic
BLE Sniffer + Ubertooth One
Bluetooth Intelligence
Intercept and decode Bluetooth Classic and BLE traffic. Proximity mapping and device fingerprinting.
TOOL DOCTRINE v2.5 — FULL INDEX
#014
futuristic
OpenWRT Custom Firmware
Network Control
Replace vendor firmware with auditable, customizable OS. Full packet control, VLAN segmentation, and IDS hooks.
TOOL DOCTRINE v2.5 — FULL INDEX
#015
futuristic
Phantom S2 / WarDrive Kit
Wardriving OSINT
Mobile WiFi intelligence rig — collects SSID, BSSID, encryption type, signal strength, and geolocation passively.
TOOL DOCTRINE v2.5 — FULL INDEX
#016
futuristic
Quantum Key Distribution (QKD) Demo
Post-Quantum Crypto
Academic and enterprise QKD simulators for understanding quantum-safe key exchange before it goes mainstream.
TOOL DOCTRINE v2.5 — FULL INDEX
#017
futuristic
CAN Bus Analyzer (USB2CAN)
Vehicle Hacking
Read and inject CAN frames into vehicle networks. Core tool for automotive red team and FOTA security research.
TOOL DOCTRINE v2.5 — FULL INDEX
#018
futuristic
Satellite OSINT Toolchain (SentinelHub)
Geospatial Intel
Real-time satellite imagery access with change detection. Monitor infrastructure, vessels, and troop movements.
TOOL DOCTRINE v2.5 — FULL INDEX
#019
futuristic
OpenAI Whisper + Local STT
SIGINT / Transcription
Self-hosted speech-to-text for intercepted audio, meeting transcription, and intelligence report generation.
TOOL DOCTRINE v2.5 — FULL INDEX
#020
futuristic
Autonomous Drone Recon Kit
Aerial OSINT
Custom FPV/autonomous UAV with downward-facing camera, GPS logging, and onboard Raspberry Pi for edge processing.
TOOL DOCTRINE v2.5 — FULL INDEX
#021
modern
Shodan
Passive Recon / OSINT
Search engine for internet-exposed devices, services, and banners. Real-time attack surface mapping at internet scale.
TOOL DOCTRINE v2.5 — FULL INDEX
#022
modern
Maltego
Graph Intelligence
Visual link analysis across domains, IPs, people, and organizations. Core enterprise OSINT pivot tool.
TOOL DOCTRINE v2.5 — FULL INDEX
#023
modern
TheHive + Cortex
SOC / IR Platform
Open-source SIEM-adjacent case management with automated enrichment. Analyst workflow engine for incidents.
TOOL DOCTRINE v2.5 — FULL INDEX
#024
modern
MISP (Threat Intel Platform)
Intel Sharing
Structured IOC sharing with STIX/TAXII support. Federated intel distribution across government and commercial orgs.
TOOL DOCTRINE v2.5 — FULL INDEX
#025
modern
Elastic Security (SIEM)
Detection Engineering
Log ingestion, correlation rules, ML anomaly detection. Full SIEM on commodity hardware or cloud.
TOOL DOCTRINE v2.5 — FULL INDEX
#026
modern
Grafana + Prometheus
Observability
Real-time metrics dashboards and alerting. Plug into any infrastructure — perfect for uptime monitoring claims.
TOOL DOCTRINE v2.5 — FULL INDEX
#027
modern
n8n
Workflow Automation
Self-hosted Zapier with code nodes. FLLC's automation backbone — webhook triggers, API chaining, AI integration.
TOOL DOCTRINE v2.5 — FULL INDEX
#028
modern
Supabase
Data Layer
Postgres-first BaaS with auth, real-time, and edge functions. FLLC production data platform.
TOOL DOCTRINE v2.5 — FULL INDEX
#029
modern
Burp Suite Pro
Web Pentest
Industry-standard HTTP interception proxy. Scanner, repeater, intruder. Essential for web application red teaming.
TOOL DOCTRINE v2.5 — FULL INDEX
#030
modern
Metasploit Framework
Exploitation
Modular exploit framework covering post-exploitation, pivoting, and payload staging. Red team and lab standard.
TOOL DOCTRINE v2.5 — FULL INDEX
#031
modern
Cobalt Strike
C2 / Red Team
Commercial adversary simulation platform. Beacon-based C2 with malleable profiles and team server architecture.
TOOL DOCTRINE v2.5 — FULL INDEX
#032
modern
Sliver C2
C2 / Red Team
Open-source Go-based C2 framework. mTLS, WireGuard, DNS beacons. Growing red team standard.
TOOL DOCTRINE v2.5 — FULL INDEX
#033
modern
Nmap + NSE Scripts
Network Recon
Port scanner with scripting engine. Fingerprints services, detects vulns, maps network topology at speed.
TOOL DOCTRINE v2.5 — FULL INDEX
#034
modern
Velociraptor
DFIR / EDR
Endpoint visibility and digital forensics platform. Hunt across thousands of hosts in real time.
TOOL DOCTRINE v2.5 — FULL INDEX
#035
modern
Arkime (Moloch)
Packet Capture
Full-packet network capture and indexing at scale. Analyst-friendly PCAP search and replay.
TOOL DOCTRINE v2.5 — FULL INDEX
#036
modern
OpenCTI
Threat Intel Platform
Structured threat intelligence with ATT&CK overlays, kill-chain mapping, and analyst workspace.
TOOL DOCTRINE v2.5 — FULL INDEX
#037
modern
Vela / Airflow
Pipeline Orchestration
Workflow scheduling for data pipelines and automation jobs. CI/CD for intelligence and automation workflows.
TOOL DOCTRINE v2.5 — FULL INDEX
#038
modern
Semgrep
Code Security
Static analysis with custom rules. Scan codebases for hardcoded secrets, injection flaws, and compliance violations.
TOOL DOCTRINE v2.5 — FULL INDEX
#039
modern
Nuclei
Vulnerability Scanner
Fast template-based scanner. 8,000+ community templates covering CVEs, misconfigs, and exposed panels.
TOOL DOCTRINE v2.5 — FULL INDEX
#040
modern
Wazuh
HIDS / SIEM
Open-source XDR/SIEM with agent-based endpoint telemetry, FIM, and compliance reporting for PCI/HIPAA/NIST.
TOOL DOCTRINE v2.5 — FULL INDEX
#041
legacy
Wireshark
Packet Analysis
Gold standard protocol analyzer. Deep packet inspection, stream reassembly, and protocol dissectors for 3,000+ protocols.
TOOL DOCTRINE v2.5 — FULL INDEX
#042
legacy
Netcat (nc)
Network Swiss Army Knife
TCP/UDP connections, file transfer, port listening, banner grabbing. 30 years old and still irreplaceable.
TOOL DOCTRINE v2.5 — FULL INDEX
#043
legacy
John the Ripper
Password Cracking
CPU-based hash cracking with rule sets and wordlists. Foundational offline cracking tool with centuries of use.
TOOL DOCTRINE v2.5 — FULL INDEX
#044
legacy
Hashcat
Password Cracking
GPU-accelerated hash cracking. Billions of hashes per second. NTLM, bcrypt, WPA2 — it handles everything.
TOOL DOCTRINE v2.5 — FULL INDEX
#045
legacy
Aircrack-ng Suite
Wireless Security
WEP/WPA2 capture, cracking, injection, and AP spoofing. Still the entry point for wireless pentesting.
TOOL DOCTRINE v2.5 — FULL INDEX
#046
legacy
tcpdump
CLI Packet Capture
Lightweight CLI packet capture. Runs on anything with a network stack. Essential for headless server diagnostics.
TOOL DOCTRINE v2.5 — FULL INDEX
#047
legacy
Hydra
Brute Force
Network service brute force — SSH, FTP, HTTP, RDP, SMTP. Fast, parallelized, and protocol-aware.
TOOL DOCTRINE v2.5 — FULL INDEX
#048
legacy
Autopsy / Sleuth Kit
Disk Forensics
Dead-box forensics platform for file recovery, timeline analysis, hash verification, and artifact extraction.
TOOL DOCTRINE v2.5 — FULL INDEX
#049
legacy
Kismet
Wireless IDS / Monitoring
Passive WiFi, Bluetooth, and Zigbee monitoring. Device fingerprinting and rogue AP detection without transmitting.
TOOL DOCTRINE v2.5 — FULL INDEX
#050
legacy
Nikto
Web Vuln Scanner
Classic web server scanner — outdated software, dangerous headers, and common misconfigs in seconds.
TOOL DOCTRINE v2.5 — FULL INDEX
#051
legacy
SQLmap
SQL Injection
Automated SQL injection and database takeover. Dumps tables, reads files, and executes OS commands via injection.
TOOL DOCTRINE v2.5 — FULL INDEX
#052
legacy
OpenVAS / GVM
Vulnerability Management
Open-source vulnerability scanner. Credentialed scans, CVE mapping, and compliance reporting since the early 2000s.
TOOL DOCTRINE v2.5 — FULL INDEX
#053
legacy
Volatility
Memory Forensics
RAM dump analysis framework. Extracts processes, network connections, injected shellcode, and encryption keys from memory.
TOOL DOCTRINE v2.5 — FULL INDEX
#054
legacy
Maltego CE
OSINT
Community edition graph pivot tool. Emails, domains, IPs — connect the dots across public data sources.
TOOL DOCTRINE v2.5 — FULL INDEX
#055
legacy
Snort
IDS / IPS
Signature-based network intrusion detection. Foundation of modern SOC detection logic — still running in production globally.
TOOL DOCTRINE v2.5 — FULL INDEX
#056
legacy
Nessus Essentials
Vulnerability Scanner
Tenable's scanner — the industry benchmark for credentialed network vulnerability assessment. 16 IP free tier.
TOOL DOCTRINE v2.5 — FULL INDEX
#057
legacy
Zenmap
GUI for Nmap
Graphical front-end for Nmap. Topology visualization, scan profiles, and diff views for non-CLI analysts.
TOOL DOCTRINE v2.5 — FULL INDEX
#058
legacy
Ettercap
MITM / ARP Poison
Man-in-the-middle attack framework for LAN-based interception. ARP poisoning, DNS spoofing, SSL stripping.
TOOL DOCTRINE v2.5 — FULL INDEX
#059
legacy
BeEF Framework
Browser Exploitation
Browser exploitation framework — hook browsers via XSS and launch social engineering or client-side attacks.
TOOL DOCTRINE v2.5 — FULL INDEX
#060
legacy
SET (Social Engineering Toolkit)
Social Engineering
Phishing sites, credential harvesting, payload delivery — the original automated social engineering platform.
⬤ Phase-Mapped Build Steps
Architecture, Training, Arsenal, Intelligence, Commerce — FLLC.net Roadmap
TOOL DOCTRINE v2.5 — FULL INDEX
#061
Phase Step
Supabase RBAC Schema (P-I Step 18)
Phase I · IA & Governance
Define members, entitlements, and role tables. Foundation for all access gating across FLLC platform tiers.
TOOL DOCTRINE v2.5 — FULL INDEX
#062
Phase Step
Content Tagging Engine (P-I Step 13)
Phase I · IA & Governance
Tag every resource: OSINT, Blue, Red, Automation, Training. Enables filtered views and dynamic navigation.
TOOL DOCTRINE v2.5 — FULL INDEX
#063
Phase Step
Legal Scaffolding Trust Center (P-I Step 11)
Phase I · IA & Governance
Terms, Privacy, License pages plus Trust Center page with uptime, compliance, and security posture statements.
TOOL DOCTRINE v2.5 — FULL INDEX
#064
Phase Step
Versioning Standard v2.5+ (P-I Step 9)
Phase I · IA & Governance
Establish content and infrastructure versioning. All published protocols, tools, and docs carry version markers.
TOOL DOCTRINE v2.5 — FULL INDEX
#065
Phase Step
SEO Schema · Enterprise Cyber (P-I Step 15)
Phase I · IA & Governance
JSON-LD structured data for organization, service, and article types. Targets enterprise + cybersecurity SERPs.
TOOL DOCTRINE v2.5 — FULL INDEX
#066
Phase Step
GitHub ↔ Site Sync Rules (P-I Step 27)
Phase I · IA & Governance
Automate deployment from repo commits. Every merged PR triggers content rebuild and cache invalidation.
TOOL DOCTRINE v2.5 — FULL INDEX
#067
Phase Step
Python → PowerShell → Ruby Path (P-II Step 48)
Phase II · Training
Ordered learning path for scripting fluency. Each language unlocks specific Arsenal tools and automation modules.
TOOL DOCTRINE v2.5 — FULL INDEX
#068
Phase Step
OverTheWire Resource Page (P-II Step 53)
Phase II · Training
Guided wargame series from Bandit to Narnia. Entry point for students before moving to Proving Grounds or PEN-200.
TOOL DOCTRINE v2.5 — FULL INDEX
#069
Phase Step
Lab-to-Real-World Mapping (P-II Step 69)
Phase II · Training
Annotate every training resource with real-world applicability — SOC, red team, government IT, analyst workflow.
TOOL DOCTRINE v2.5 — FULL INDEX
#070
Phase Step
Progress Persistence UI (P-II Step 65)
Phase II · Training
Supabase-backed completion state per member. Checkboxes, progress bars, and certificate readiness indicators.
TOOL DOCTRINE v2.5 — FULL INDEX
#071
Phase Step
Arsenal Recon Segment (P-III Step 114)
Phase III · Arsenal
Curate passive recon tools: Shodan, Maltego, Spiderfoot, Amass, theHarvester — with write-ups and use cases.
TOOL DOCTRINE v2.5 — FULL INDEX
#072
Phase Step
Build Your Stack UI (P-III Step 153)
Phase III · Arsenal
Interactive stack builder — pick tools by role, mission, or sector. Export config as JSON or PDF.
TOOL DOCTRINE v2.5 — FULL INDEX
#073
Phase Step
MITRE ATT&CK Overlays (P-III Step 181)
Phase III · Arsenal
Map every Arsenal tool to ATT&CK tactics and techniques. Visual kill-chain alignment for analyst and client use.
TOOL DOCTRINE v2.5 — FULL INDEX
#074
Phase Step
Kill-Chain Visualization (P-III Step 180)
Phase III · Arsenal
Overlay tools across the 7-phase kill chain. Show enterprise clients exactly where their gaps are.
TOOL DOCTRINE v2.5 — FULL INDEX
#075
Phase Step
Arsenal Access Gating (P-III Step 155)
Phase III · Arsenal
Gate tools by member tier. Free → restricted → enterprise-only. Supabase entitlement checks on every route.
TOOL DOCTRINE v2.5 — FULL INDEX
#076
Phase Step
FURIOS-INT Field Manual (P-IV Step 204)
Phase IV · Intelligence
Publish Protocols 01–13 as structured chapters with objectives, tooling, failure modes, and validation techniques.
TOOL DOCTRINE v2.5 — FULL INDEX
#077
Phase Step
Intelligence Lifecycle Diagrams (P-IV Step 212)
Phase IV · Intelligence
Visual flows: collection → processing → analysis → dissemination. Anchors the field manual doctrine visually.
TOOL DOCTRINE v2.5 — FULL INDEX
#078
Phase Step
Quantum Readiness Notes (P-IV Step 218)
Phase IV · Intelligence
Forward-looking section on post-quantum cryptography implications for intelligence workflows and key management.
TOOL DOCTRINE v2.5 — FULL INDEX
#079
Phase Step
Restricted API Hooks (P-IV Step 241)
Phase IV · Intelligence
Internal API endpoints for gated intelligence content. Audit logged, role-gated, with rate limiting and token auth.
TOOL DOCTRINE v2.5 — FULL INDEX
#080
Phase Step
CyberWorld MMO Supabase Economy (P-V Step 284)
Phase V · CyberWorld
In-platform currency, XP, and item system backed by Supabase. Gamified progression tied to real training milestones.
TOOL DOCTRINE v2.5 — FULL INDEX
#081
Phase Step
Discord Role Integration (P-V Step 291)
Phase V · Members
Sync member tier and achievement unlocks to Discord roles. Automate community access without manual management.
TOOL DOCTRINE v2.5 — FULL INDEX
#082
Phase Step
Enterprise Procurement Flow (P-V Step 306)
Phase V · Commerce
Invoice generation, PO number support, and net-30 payment flows for government and enterprise clients.
TOOL DOCTRINE v2.5 — FULL INDEX
#083
Phase Step
Breach Simulation Opt-In (P-V Step 322)
Phase V · Members
Members opt into simulated phishing, C2 beaconing alerts, and tabletop exercises as part of gamified training.
TOOL DOCTRINE v2.5 — FULL INDEX
#084
Phase Step
Status Page + Incident History (P-V Step 330)
Phase V · Commerce
Public uptime page with SLA metrics and incident history. Validates the 99.9% uptime claim to enterprise buyers.
TOOL DOCTRINE v2.5 — FULL INDEX
#085
Phase Step
Stripe Checkout Integration
Commerce · Live
Production checkout at buy.stripe.com — Website Factory ($99–$249/mo), Marketing Automation ($297–$1,497/mo).