New persona variants: - forge/frontend-design — DESIGN.md methodology, 58-brand reference, UI/UX intelligence - oracle/source-verification — 5-section forensic verification protocol (ethos/pathos/context/intent/logos) - sentinel/c2-hunting — 6-phase C2 hunting with beaconing detection, detection engineering Enhanced existing personas: - neo: Added Active Directory exploitation (Kerberoasting, DCSync, delegation), network pivoting, cloud attacks - frodo: Added response mode auto-detection, claim extraction, Devil's Advocate, explicit uncertainty tracking - ghost: Added cognitive warfare expertise (behavioral science weaponization, algorithmic amplification) Build system enhancements: - Cross-persona escalation graph auto-extracted → generated/_index/escalation_graph.json - Trigger→persona routing index → generated/_index/trigger_index.json - Quality validation with warnings for thin/missing sections - Section word counts injected into every output - Richer CATALOG.md with depth stats, escalation paths, trigger index Platform auto-install: - python3 build.py --install claude — 111 slash commands → ~/.claude/commands/ - python3 build.py --install antigravity — personas → ~/.config/antigravity/personas/ - python3 build.py --install gemini — Gems → generated/_gems/ - python3 build.py --install openclaw — IDENTITY.md + personas → generated/_openclaw/ - python3 build.py --install all — deploy to all platforms Shared reference library: - personas/_shared/kali-tools/ — 16 Kali Linux tool reference docs - personas/_shared/osint-sources/ — OSINT master reference - personas/_shared/ad-attack-tools/ — AD attack chain reference Stats: 29 personas, 111 variants, 59,712 words Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Kali Tools
Kali Linux tool reference guides organized by category. 15 numbered chapters covering the full spectrum of penetration testing and security assessment tools.
File Index
kali-tools/
├── README.md
├── 01-network-scanning.md # Nmap, Masscan, host discovery
├── 02-web-vuln-scanning.md # Nikto, OWASP ZAP, web scanners
├── 03-fuzzing-bruteforce.md # Ffuf, Gobuster, directory brute-forcing
├── 04-password-cracking.md # Hashcat, John the Ripper, credential attacks
├── 05-exploitation.md # Metasploit, exploit frameworks
├── 06-osint-recon.md # OSINT tools and reconnaissance
├── 07-dns-tools.md # DNS enumeration and analysis
├── 08-smb-enum.md # SMB/CIFS enumeration
├── 09-network-utils.md # Network utilities and helpers
├── 10-forensics-ssl-wireless.md # Forensics, SSL/TLS, wireless tools
├── 11-web-attacks-advanced.md # Advanced web exploitation techniques
├── 12-windows-ad-attacks.md # Windows and Active Directory attacks
├── 13-osint-frameworks.md # OSINT frameworks and platforms
├── 14-wireless-netdiscovery.md # Wireless and network discovery
└── 15-python-security-libs.md # Python security libraries