Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content
View TeamStarWolf's full-sized avatar
👾
Vibing…
👾
Vibing…

Block or report TeamStarWolf

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
TeamStarWolf/README.md

TeamStarWolf

A public resource library for the cybersecurity community.


Start Here

Resource Description
Enterprise Security Pipeline End-to-end security lifecycle with vendor mapping across all 6 stages
Starred Repositories Curated repos structured around Cybersecurity Technology
Cybersecurity Book List Books, labs, and companion repos grouped for practical learning, with cert roadmaps and learning paths
YouTube Channel Library Active channels across multiple security disciplines
X / Twitter Follow List Vetted accounts that regularly share original research, tooling, or operational insight
Career Paths 15+ cybersecurity roles with skill maps, salary ranges, cert roadmaps, and career transition paths
Certifications Reference Detailed reference for 40+ security certifications — cost, difficulty, DoD 8570, and who should pursue each
Hands-On Labs Free lab environments, CTF platforms, and home lab builds mapped to each security discipline
Security Tools Reference Quick-reference matrices of 100+ security tools organized by category with OSS/commercial tags
Frameworks Reference Side-by-side comparison of NIST CSF, 800-53, ISO 27001, SOC 2, PCI DSS, CMMC, GDPR, and 10+ other frameworks
Security Glossary 100+ cybersecurity terms, acronyms, and definitions from APT to ZTNA
Threat Actors Nation-state APTs, ransomware groups, and eCrime actors mapped to ATT&CK TTPs
IR Playbooks Step-by-step response procedures for ransomware, BEC, data exfiltration, DDoS, cloud incidents, and more
HTB Machine Index 127 retired HackTheBox machines indexed by difficulty, OS, and skills learned
Resources Books, courses, YouTube channels, podcasts, CTF platforms, and communities
HTB Learning Tracks 45 curated HackTheBox learning tracks mapped to disciplines and certification paths
Interview Prep Common interview questions by role — SOC analyst, pentester, DFIR, cloud security, AppSec
Home Lab Setup Hardware, hypervisors, network architecture, and detection stacks for building a security lab
Pentest Checklists Step-by-step checklists for external, internal, AD, web app, cloud, and post-exploitation testing
CTF Methodology Systematic approach to web, forensics, crypto, reverse engineering, binary exploitation, and OSINT challenges
Privilege Escalation Reference Linux and Windows privilege escalation techniques with ATT&CK mappings and automated tools
Cloud Attack Reference AWS, Azure, and GCP attack techniques, IAM escalation paths, and defensive controls
Network Attacks Reference ARP poisoning, VLAN hopping, LLMNR poisoning, MITM, network pivoting, tunneling, evasion techniques, and Scapy/Nmap reference
Network Monitoring Reference Zeek logs/scripts, Suricata rules, JA3/JARM, NetFlow/SiLK, beaconing detection, DGA hunting, Security Onion
Digital Forensics Reference Order of volatility, chain of custody, disk acquisition, Windows/Linux artifacts, Volatility 3 memory forensics, and log analysis
Incident Response Reference NIST/SANS IR frameworks, live response commands, Velociraptor/KAPE, ransomware playbook, BEC response, AD compromise
Malware Analysis Reference Static/dynamic analysis, PE structure, process injection, YARA rules, ransomware, memory forensics, Volatility 3
GRC Reference Security governance, risk management (FAIR), SOC 2, ISO 27001, PCI DSS, TPRM, compliance program management
Threat Modeling Reference STRIDE, PASTA, LINDDUN, attack trees, MITRE ATT&CK integration, DFDs, pytm, cloud microservices threat modeling
Detection Rules Reference Sigma, YARA, and Suricata rule writing with examples and conversion to Splunk, Elastic, and Sentinel
Malware Families Ransomware, banking trojans, RATs, APT malware, rootkits, and loaders with TTPs and analysis resources
Enterprise Infrastructure Reference Every OS, server role, and network component encountered in enterprise environments — with security context and ATT&CK relevance
Open Source Toolkit Comprehensive open source security tooling reference and bookmarks organized by category across 20+ disciplines
Conference Talks & Papers Black Hat, DEF CON, BSides, CCC, USENIX, and landmark talk archives — with guidance on finding associated research repos
Security Metrics Reference SOC KPIs, vulnerability management SLAs, detection coverage scoring, risk metrics, and executive reporting frameworks
API Security Reference OWASP API Top 10, REST and GraphQL attack techniques, JWT attacks, SSRF, BOLA/BFLA, and API security testing methodology
Windows Hardening CIS benchmarks, GPO hardening, ASR rules, Defender for Endpoint, AppLocker/WDAC, and compliance scanning
Linux Hardening CIS Benchmark, STIG, kernel hardening (sysctl), SELinux/AppArmor, auditd rules, SSH hardening, service sandboxing
Network Security Architecture DMZ design, VLAN segmentation, firewall policy, IDS/IPS placement, NAC/802.1X, DDoS protection, and network monitoring
Wireless Security Reference WiFi attacks (WPA2/WPA3, evil twin, PMKID), Bluetooth, SDR, RFID/NFC, and enterprise wireless hardening
Social Engineering Reference Phishing taxonomy, AiTM attacks, vishing, pretexting, physical SE, simulation programs, and awareness training
Deception Technology Honeypots, honeytokens, canary tokens, deception platforms, breadcrumb strategy, and detection rules
Threat Intelligence Reference Intel lifecycle, STIX/TAXII, threat actor profiles, IOC enrichment, TIP platforms, and intelligence-driven detection
Container Security Reference Docker/container security, image hardening, runtime protection (Falco/seccomp/AppArmor), container escape defense, registry security, secrets management, SBOM, MITRE ATT&CK containers
Cryptography Reference Symmetric/asymmetric crypto, TLS configuration, PKI, key management, post-quantum cryptography, and attack reference
Password Security Reference Hash formats, hashcat/John mastery, Argon2/bcrypt/PBKDF2 storage, NIST 800-63B policy, LAPS, gMSA, HIBP API
Purple Team Reference Adversary emulation, Atomic Red Team, CALDERA, detection validation, Sigma rules, BAS tools, ATT&CK Navigator coverage
Zero Trust Reference NIST SP 800-207, CISA ZTMM v2.0, identity/device/network/data pillars, ZTNA, micro-segmentation, and implementation roadmap
Blockchain Security Reference Smart contract vulnerabilities, DeFi hack case studies, auditing tools, consensus security, exchange security, and on-chain incident response
Web App Pentesting Testing methodology, SQLi/XSS/SSRF/SSTI payloads, JWT attacks, auth bypass, business logic testing, Burp Suite and ffuf reference
Exploit Development Reference Buffer overflows, ROP chains, heap exploitation, format strings, shellcode, pwntools, Windows exploit dev, CTF resources
Active Directory Attacks BloodHound, Kerberoasting, DCSync, Golden/Silver/Diamond tickets, RBCD, ADCS ESC1-8, NTLM relay, lateral movement
Networking Fundamentals OSI model, TCP/IP deep dive, subnetting, ARP/VLANs/STP, routing protocols (OSPF/BGP), DNS, and essential troubleshooting commands for security practitioners
Vendor Prevention Policies Authoritative policy settings from Microsoft (ASR/MDE), CrowdStrike, SentinelOne, Palo Alto, Proofpoint, Zscaler, CISA, NSA, Elastic, and Splunk
Cloud Security Reference AWS/Azure/GCP security services, IAM attacks, SSRF to IMDS, Pacu/ROADtools/AzureHound, CSPM, K8s security, cloud IR
SIEM Detection Content Official detection rules from Sigma, Elastic, Splunk ESCU, Microsoft Sentinel, MITRE ATT&CK mitigations, CIS Controls, and DISA STIGs
Vulnerability Management CVSS v3.1/v4.0 scoring, EPSS prioritization, CISA KEV, scanning tools, patch management, and program KPIs
Packet Analysis Reference Wireshark display filters, tcpdump BPF syntax, Zeek logs and scripting, JA3 fingerprinting, and attack pattern detection in pcaps
Mobile Security Reference OWASP MASVS, Android/iOS security architecture, APK/IPA analysis, Frida/objection, MDM/MAM policies, and mobile threats
Cloud Network Security AWS VPC/Security Groups/WAF/Network Firewall, Azure NSG/Firewall/Private Endpoints, GCP VPC/Cloud Armor, and flow log analysis
Secure Coding Reference OWASP Top 10 (2021), input validation, auth/session security, cryptography in code, SAST/DAST tools, and supply chain security
AI Security Reference OWASP LLM Top 10, prompt injection attacks, adversarial ML, LLM deployment security, guardrails, and AI in security operations
Supply Chain Security SolarWinds/XZ Utils/3CX attack analysis, SBOM (Syft/CycloneDX/SPDX), SLSA framework, Sigstore/Cosign, and CI/CD pipeline hardening
Red Team Reference Red team methodology, ROE, C2 framework comparison (Cobalt Strike/Sliver/Havoc/Mythic), LOLBAS, persistence, lateral movement tradecraft
DevSecOps Reference SAST/DAST/SCA tools, GitHub Actions security, Semgrep/CodeQL/Trivy/Snyk, secrets detection, IaC scanning, pipeline security gates
Browser Security Reference SOP, CORS attacks, CSP bypass, security headers, CSRF, clickjacking, cookie security, extension analysis, prototype pollution

Disciplines

Focused starting points by area of practice. Each page includes a learning path, free training resources, tools, books, certifications, and who to follow.

Discipline Focus
Threat Intelligence Collecting, analyzing, and acting on threat data to understand adversary capabilities and intent
Detection Engineering Building, tuning, and validating detections across log sources, SIEMs, and EDR platforms
Incident Response Responding to, containing, and recovering from security incidents
Offensive Security Penetration testing, red teaming, adversary emulation, and vulnerability research
Vulnerability Management Identifying, prioritizing, and remediating vulnerabilities across the environment
Cloud Security Securing cloud infrastructure, containers, serverless, and cloud identity
Network Security Monitoring and defending network traffic; NSM, IDS/IPS, Zero Trust networking
Malware Analysis Static and dynamic malware analysis, reverse engineering, and sandbox investigation
ICS / OT Security Securing industrial control systems, SCADA, PLCs, and critical infrastructure
Application Security Web/API security, secure SDLC, SAST/DAST, threat modeling, and bug bounty
Adversarial AI Attacks Attacking AI and ML systems — adversarial examples, model inversion, data poisoning, and LLM jailbreaks
AI & LLM Security Securing AI systems, red-teaming LLMs, prompt injection, and adversarial ML
Governance, Risk & Compliance Risk frameworks, compliance programs, NIST CSF/800-53, ISO 27001, GRC tooling
Hacker Hobbies & Community Locksport, SDR, electronics, badge hacking, ham radio, car hacking, DEF CON villages, and the broader hacker community
Digital Forensics Disk, memory, and network forensics; evidence handling; DFIR methodology
Security Architecture Zero Trust design, threat modeling, defense-in-depth, and architectural frameworks
DevSecOps Integrating security into CI/CD pipelines; SAST, SCA, IaC scanning, secrets detection
Cryptography & PKI Certificate lifecycle, key management, HSMs, TLS hardening, and post-quantum readiness
Supply Chain Security SBOM generation, artifact signing, dependency security, and SLSA framework
Privacy Engineering PII detection, data minimization, consent management, DSR automation, GDPR/CCPA
Identity & Access Management IAM/PAM architecture, SSO/MFA, Zero Trust identity, AD security, and CIEM
Security Operations SOC operations, SIEM/SOAR, threat hunting, detection lifecycle, and SOC metrics
Data Security Data classification, DLP, encryption, DSPM, and database activity monitoring
Active Defense & Deception Honeypots, honeytokens, canary tokens, deception grids, and adversary engagement
Hardware Security Firmware analysis, secure boot, TPM/HSM, hardware hacking, side-channel attacks
Mobile Security iOS/Android app security, MASVS, MDM/EMM, mobile threat defense, dynamic analysis
Purple Teaming Adversary emulation, BAS, detection validation, ATT&CK coverage measurement
Radio Frequency Security RF attack techniques, SDR tooling, replay attacks, protocol analysis, and wireless security testing
Bug Bounty Web/API/mobile vulnerability research, recon methodology, responsible disclosure
Social Engineering Phishing simulations, pretexting, vishing, security awareness training, human risk management
Physical Security Physical pen testing, RFID cloning, badge bypass, access control systems, facility security
Threat Modeling STRIDE/PASTA/LINDDUN methodologies, threat model as code, DFD-based analysis, DevSecOps integration
OSINT Open source intelligence collection, recon methodology, SOCMINT/GEOINT, OpSec for analysts
Zero Trust Architecture ZT principles, CISA ZTMM, microsegmentation, ZTNA tooling, BeyondCorp, NIST SP 800-207
IoT Security IoT attack surface, firmware analysis, MQTT/CoAP testing, device identity, OWASP IoT Top 10
Container & Kubernetes Security Container runtime security, K8s RBAC, image scanning, Falco, OPA Gatekeeper, CKS prep
Cyber Risk Quantification FAIR methodology, Monte Carlo simulation, ALE/ROSI calculation, board-level risk communication
Blockchain & Web3 Security Smart contract auditing, DeFi exploits, reentrancy, Slither/Echidna/Mythril, Ethernaut CTF
Security Awareness Phishing simulation, behavior change programs, KnowBe4/GoPhish, human risk metrics
Active Directory Security AD attack paths, Kerberoasting, DCSync, BloodHound, defensive controls, and detection strategies
AI / ML Security Adversarial ML, model inversion, data poisoning, MITRE ATLAS, and MLOps security
Exploit Development Buffer overflows, ROP chains, heap exploitation, format strings, fuzzing, and CVE research
Penetration Testing Scoping, methodology, CVSS scoring, tooling by phase, and report structure
Red Teaming APT simulation, C2 frameworks, payload evasion, infrastructure OPSEC, and engagement types
Reverse Engineering x86/x64 assembly, static/dynamic analysis, anti-analysis bypasses, and platform-specific RE
SIEM & SOAR SIEM architecture, SPL/KQL query writing, SOAR playbook design, and log source onboarding
Threat Hunting Hypothesis-driven hunting, ATT&CK-mapped procedures, Splunk/KQL queries, and maturity model
DevSecOps Reference SAST/DAST/SCA tools, GitHub Actions security, Semgrep/CodeQL/Trivy/Snyk, secrets detection, IaC scanning, pipeline security gates

Free & Accessible Training

High-quality training does not require a large budget. These platforms offer free or pay-what-you-can content taught by working practitioners.

Platform Focus
Antisyphon Training Pay-what-you-can live courses from John Strand and practitioners; SOC, pentesting, active defense
Black Hills Information Security Hundreds of free webcasts on every security discipline
TCM Security Academy Free tier with 25+ hours of on-demand content; practical ethical hacking and SOC
PortSwigger Web Security Academy The best free web application security training available; interactive labs for every major vulnerability class
Hack The Box Academy Free Student tier; SOC analyst, DFIR, penetration testing, and cloud security paths
TryHackMe Browser-based beginner-to-advanced labs; no local setup required
IppSec HackTheBox walkthroughs demonstrating real attack techniques with full methodology
Blue Team Labs Online Free investigation challenges for detection, forensics, and IR
LetsDefend Free SOC simulator for alert triage and threat analysis
CISA Training Catalog No-cost federal training open to the public including ICS/OT, cloud, and IR content
Anthropic Courses Free AI and LLM security courses from Anthropic
DevSecOps Reference SAST/DAST/SCA tools, GitHub Actions security, Semgrep/CodeQL/Trivy/Snyk, secrets detection, IaC scanning, pipeline security gates

Coverage & Data

Machine-readable data files and an ATT&CK Navigator layer connecting the TeamStarWolf vendor stack to NIST 800-53 controls and ATT&CK techniques.

Resource Description
ATT&CK Navigator Layer NIST 800-53 R5 → ATT&CK coverage heatmap (313 techniques, CTID-sourced). Load in Navigator ↗
Vendor → Control edges JSONL edge table: 100+ vendor → NIST 800-53 control mappings
Control → Technique edges JSONL edge table: NIST 800-53 R5 → ATT&CK technique mappings (CTID)
Vendor → Technique edges JSONL derived edge table: vendor → ATT&CK technique coverage via control join
Controls Mapping Full Vendor → NIST 800-53 → ATT&CK cross-reference
Coverage Schema Gap scoring data model, JSON schemas, Python scoring functions
ICS/OT Security Reference ICS/SCADA architecture, Stuxnet/TRITON/Industroyer analysis, Modbus/DNP3/S7 attacks, IEC 62443, NERC CIP, Dragos/Claroty
OSINT Reference Comprehensive OSINT methodology: passive/active recon, Google dorks, domain/IP intelligence, SOCMINT, GEOINT, corporate and threat intel OSINT, full tools reference, and ATT&CK mapping
Network Protocols Security DNS, HTTP, SMB, Kerberos, RDP, SSH, LDAP, SNMP, NTP, DHCP, BGP — how each protocol works and how attackers exploit it
DevSecOps Reference SAST/DAST/SCA tools, GitHub Actions security, Semgrep/CodeQL/Trivy/Snyk, secrets detection, IaC scanning, pipeline security gates

Tool

Deploy to GitHub Pages

Docker Build

License: MIT

MITRE ATT&CK workbench for coverage review, detection engineering, exposure mapping, and threat-intelligence correlation. Supports Enterprise, ICS, and Mobile ATT&CK domains.

Capabilities

  • Multiple heatmap modes across coverage, detection, exposure, compliance, and risk

  • CVE mappings with live integrations: MISP, OpenCTI, EPSS, CISA KEV, NVD, Elastic, Splunk, Sigma, Atomic Red Team, ExploitDB, and Nuclei

  • STIX 2.1 import/export, custom technique editing, and collection sharing

  • Deployable via Docker or GitHub Pages

Repository | Live Site | Docs


Side Projects

Project Description
LimeWire Python desktop audio studio — download, analysis, editing, stem separation, and batch processing
PokeNav Offline-first Pokemon encyclopedia with game-aware browsing and trainer archives
Identity Security Reference IAM, PAM, MFA bypass techniques, AD attacks, Okta/Entra/CyberArk/Vault vendor controls, identity detection
Physical Security Reference Lock picking, RFID badge cloning (Proxmark3/Flipper Zero), physical pentesting, drop boxes, CCTV assessment, NIST PE controls
Endpoint Security Reference MDE/CrowdStrike/SentinelOne config, all 19 ASR rules, Sysmon event IDs, Windows audit policy, KQL hunting queries
Privacy Engineering Reference GDPR/CCPA/HIPAA, Privacy by Design, anonymization/pseudonymization, consent management, DPIA, field-level encryption
Hardware Security Reference TPM 2.0, HSM/FIPS 140-3, Secure Boot/UEFI, side-channel attacks, fault injection, JTAG, confidential computing (SGX/TDX/SEV)
Email Security Reference SPF/DKIM/DMARC deep dive, phishing analysis, HTML smuggling, BEC, M365 Defender config, SMTP hardening, email forensics
Kubernetes Security Reference K8s RBAC attacks, container escape, Pod Security Standards, NetworkPolicy, secrets management, Falco, kube-bench
Fuzzing & Vulnerability Research AFL++, libFuzzer, OSS-Fuzz, binary analysis, Ghidra/angr, symbolic execution, CVE process, bug bounty methodology
Security Architecture Reference Defense-in-depth, Zero Trust architecture, cloud security design, application security patterns, identity architecture, SecOps architecture, and resilience design
Wireless Security Reference Wi-Fi protocols (WEP/WPA/WPA3), Bluetooth, Cellular (4G/5G), RFID/NFC, IoT protocols, attack techniques, WIDS, hardening, standards
Automotive Security Reference CAN bus attacks, ECU security, OTA update integrity, V2X/DSRC/C-V2X, key fob relay attacks, ADAS sensor spoofing, ISO 21434, UNECE WP.29
Firmware & IoT Security Reference IoT/Firmware attack surface, extraction, analysis, UEFI/BIOS, protocols, hardware interfaces, standards
HONEYPOT_DECEPTION_REFERENCE.md Honeypot & Deception Technology Reference — OpenCanary, Cowrie, Dionaea, T-Pot, Canarytokens, MITRE D3FEND/ATT&CK mapping
  • AI & MCP Security Reference
  • AI Offensive Security Reference — AI-powered offensive security tools (Glasswing, Clearwing, CVE exploitation, MITRE ATT&CK mapping, defensive frameworks) | PENETRATION_TESTING_METHODOLOGY.md | Comprehensive penetration testing methodology reference covering scoping, recon, exploitation, post-exploitation, web, cloud, reporting, and MITRE ATT&CK mapping | Security | | Windows Hardening Reference | Comprehensive Windows security hardening: architecture, accounts, GPO, Sysmon, WEF, PowerShell, Defender, AppControl, network, audit policy | Windows 10/11, Server 2019/2022 | | GRC Compliance Reference | Deep-dive reference for GRC fundamentals, NIST CSF 2.0, OSCAL, ComplianceAsCode/OpenSCAP, CIS Controls v8, PCI DSS v4.0, HIPAA/HITECH, SOC 2 Type II, ISO 27001:2022, and GRC automation tooling | | Secrets Management Reference | HashiCorp Vault, CyberArk Conjur, secret detection (gitleaks/ggshield/TruffleHog), cloud-native secrets (AWS/Azure/GCP), Kubernetes secrets security, PKI/SSH management, CI/CD OIDC federation, secrets operations | | Network Defense Reference | Suricata, Zeek, Security Onion, Arkime, DNS security, nDPI, NAC, DDoS protection, NSM operations | | Threat Hunting Reference | Comprehensive threat hunting reference: KQL, SPL, Sigma, YARA, ATT&CK playbooks, Velociraptor, osquery, TI integration, and hunt tracking | | SDR & RF Security Reference | Software-Defined Radio and RF security: hardware, GNU Radio, protocol analysis (GSM/LTE/Bluetooth/Zigbee/P25), replay attacks, RFID/NFC, Kismet, TEMPEST, and legal framework | | DevSecOps Reference | Shift-left philosophy, BSIMM/SAMM maturity models, SAST/SCA/DAST tooling, secrets management, pipeline security, container security, SLSA supply chain, and compliance-as-code | | Linux Hardening Reference | Linux system hardening, CIS Benchmarks, SELinux, auditd, firewall, compliance |

Pinned Loading

  1. TeamStarWolf TeamStarWolf Public

    GitHub profile README for TeamStarWolf.

    Python 1

  2. ATTACK-Navi ATTACK-Navi Public

    ATTACK-Navi — Angular 19 MITRE ATT&CK workbench with 24 heatmap modes, MISP/OpenCTI integrations, and analyst workflows across coverage, exposure, detection, and defense.

    TypeScript 1