Skip to content
View TeamStarWolf's full-sized avatar
👾
Vibing…
👾
Vibing…

Block or report TeamStarWolf

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
TeamStarWolf/README.md

TeamStarWolf

A public resource library for the cybersecurity community.

Reference Index  |  Discipline Paths  |  ATTACK-Navi


Browse by Domain

Offensive Security
Reference Coverage
Penetration Testing Methodology Structured methodology for external, internal, web, and AD engagements
Red Team Reference ROE, C2 frameworks, OPSEC, payload dev, lateral movement tradecraft
Active Directory Attacks Kerberoasting, DCSync, Golden tickets, BloodHound, AD CS attacks
Web Application Pentesting SQLi, XSS, SSRF, JWT attacks, Burp Suite, auth bypass
Social Engineering Reference Phishing, vishing, AiTM, pretexting, campaign ops
Privilege Escalation Reference Windows and Linux privesc with detection and remediation
Exploit Development Reference Buffer overflows, ROP chains, shellcode, pwntools
CTF Methodology Web, forensics, crypto, reversing, pwn — systematic approach and tooling
Defensive Security
Reference Coverage
Incident Response Reference NIST/SANS IR frameworks, live response, forensic triage
Threat Hunting Reference Hypothesis-driven hunting, KQL/SPL queries, data sources
SIEM Reference Splunk, Sentinel, QRadar, Elastic — query languages and detection engineering
Digital Forensics Reference Disk, memory, network, and cloud forensics workflows
Malware Analysis Reference Static/dynamic analysis, sandbox, behavioral detection
Purple Team Reference Adversary emulation, Atomic Red Team, detection validation
Detection Rules Reference Sigma, YARA, Suricata rule writing with examples
Network Defense Reference IDS/IPS, firewall policy, network segmentation, NDR
Cloud & Infrastructure
Reference Coverage
Cloud Security Reference AWS/Azure/GCP controls, IAM, CSPM, cloud-native threats
Cloud Attack Reference Cloud privilege escalation, lateral movement, exfiltration, persistence
Container Security Reference Docker hardening, Kubernetes security, container escapes
DevSecOps Reference SAST/DAST/SCA, GitHub Actions security, secrets in CI/CD
Supply Chain Security Reference SBOM, Sigstore/cosign, SLSA, dependency security
Network Security Architecture DMZ design, VLAN segmentation, firewall policy
Windows Hardening Reference Sysmon, WEF, Defender, AppControl, GPO, ASR rules
Linux Hardening Reference CIS benchmarks, sysctl, SELinux, auditd, service hardening
Identity, Access & Cryptography
Reference Coverage
Identity Access Management Reference IAM architecture, MFA, PAM, JIT, SSO
Active Directory Security Reference AD hardening, tiered admin, MDI, Kerberos defense
Zero Trust Reference NIST SP 800-207, CISA ZTMM, microsegmentation, BeyondCorp
Secrets Management Reference Vault, AWS Secrets Manager, rotation, detection
Cryptography Reference Symmetric/asymmetric, TLS, PKI, HSM, quantum-resistant algorithms
Password Security Reference Hash formats, hashcat/John, credential stuffing defense
Governance, Risk & Compliance
Reference Coverage
GRC Compliance Reference NIST 800-53, ISO 27001, SOC 2, PCI DSS, HIPAA, CMMC
Security Metrics Reference MTTD/MTTR, vulnerability SLAs, SOC KPIs, FAIR model
Threat Modeling Reference STRIDE, PASTA, attack trees, MITRE ATT&CK integration
Vulnerability Management Reference CVSS, EPSS, CISA KEV, VEX, patch prioritization
Privacy Engineering Reference GDPR/CCPA, PbD, data minimization, PIA
Security Architecture Reference Zero trust, defense-in-depth, SABSA, enterprise patterns
Specialized Domains
Reference Coverage
Automotive Security Reference CAN bus, ECU, V2X, OTA updates, ISO 21434
ICS/OT Security Reference SCADA, PLC, Purdue model, IEC 62443, OT incident response
Hardware Security Reference TPM, HSM, side-channel attacks, JTAG/SWD, fault injection
Firmware & IoT Security Reference Binwalk, UART/JTAG extraction, firmware emulation
Mobile Security Reference OWASP MASVS, Android/iOS RE, Frida, MDM/MAM
AI Security Reference LLM threat models, prompt injection, adversarial ML, MCP security
SDR & RF Security Reference HackRF, Flipper Zero, sub-GHz analysis, RF attack surface
Research & Analysis
Reference Coverage
OSINT Reference Passive recon, Shodan/Censys, GEOINT, SOCMINT, automation
Reverse Engineering Reference Ghidra/IDA/Binary Ninja, dynamic analysis, firmware RE
Threat Intelligence Reference Intel lifecycle, STIX/TAXII, threat actor tracking
Network Protocols Reference TCP/IP, DNS, TLS, authentication protocols, analysis tools
Packet Analysis Reference Wireshark, tcpdump, Zeek, JA3, attack pattern detection
Network Forensics Reference PCAP forensics, NetFlow, encrypted traffic analysis, cloud

Coverage & Data

ATT&CK Navigator layer and machine-readable edge tables mapping the TeamStarWolf vendor stack to NIST 800-53 controls and ATT&CK techniques.

Resource Description
ATT&CK Navigator Layer NIST 800-53 R5 -> ATT&CK heatmap (313 techniques, CTID-sourced)  Load in Navigator
Vendor -> Control edges 100+ vendor -> NIST 800-53 control mappings
Control -> Technique edges NIST 800-53 R5 -> ATT&CK technique mappings (CTID)
Vendor -> Technique edges Derived vendor -> ATT&CK technique coverage via control join
Controls Mapping Full vendor -> NIST 800-53 -> ATT&CK cross-reference
Coverage Schema Gap scoring data model, JSON schemas, and Python scoring functions
Learning & Career
Reference Coverage
Career Paths 15+ security roles with skill maps, salary ranges, and cert roadmaps
Certifications Reference 40+ certifications with cost, difficulty, and domain coverage
Interview Prep Questions by role: SOC analyst, pentester, DFIR, cloud security
Home Lab Setup Hardware, hypervisors, network design, detection stacks
Hands-On Labs Free lab environments and CTF platforms mapped to each security domain
Cybersecurity Book List Curated reading organized by discipline and level
Starred Repositories Curated GitHub repos structured around the security technology landscape

Free Training

Platform What You Get
Antisyphon Training Pay-what-you-can live courses — SOC, pentesting, active defense
Black Hills Information Security Hundreds of free webcasts on every security discipline
TCM Security Academy Practical ethical hacking and SOC content, free tier
PortSwigger Web Security Academy Best free web security training — interactive labs for every major vuln class
Hack The Box Academy Free Student tier — SOC, DFIR, pentesting, and cloud paths
TryHackMe Browser-based labs from beginner to advanced, no local setup required
IppSec HackTheBox walkthroughs with full attack methodology
Blue Team Labs Online Free investigation challenges for detection, forensics, and IR
LetsDefend Free SOC simulator for alert triage and threat analysis
CISA Training Catalog No-cost federal training — ICS/OT, cloud, and IR
Anthropic Courses Free AI and LLM security courses

ATTACK-Navi

Deploy to GitHub Pages Docker Build License: MIT

MITRE ATT&CK workbench for coverage review, detection engineering, exposure mapping, and threat-intelligence correlation. Supports Enterprise, ICS, and Mobile ATT&CK domains.

Capability Details
Heatmap modes Coverage, detection, exposure, compliance, and risk
Live integrations MISP, OpenCTI, EPSS, CISA KEV, NVD, Elastic, Splunk, Sigma, Atomic Red Team, ExploitDB, Nuclei
Data STIX 2.1 import/export, custom technique editing, collection sharing
Deployment Docker or GitHub Pages

Repository  |  Live Site  |  Docs


Projects

Project Description
LimeWire Python desktop audio studio — download, analysis, editing, stem separation, and batch processing
PokeNav Offline-first Pokemon encyclopedia with game-aware browsing and trainer archives

Pinned Loading

  1. TeamStarWolf TeamStarWolf Public

    GitHub profile README for TeamStarWolf.

    Python 2

  2. ATTACK-Navi ATTACK-Navi Public

    ATTACK-Navi — Angular 19 MITRE ATT&CK workbench with 24 heatmap modes, MISP/OpenCTI integrations, and analyst workflows across coverage, exposure, detection, and defense.

    TypeScript 1