TeamStarWolf (James McCloud) · GitHub
Skip to content
View TeamStarWolf's full-sized avatar
👾
Vibing…
👾
Vibing…

Block or report TeamStarWolf

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
TeamStarWolf/README.md

TeamStarWolf

A public resource library for the cybersecurity community.


Start Here

Resource Description
Enterprise Security Pipeline End-to-end security lifecycle with vendor mapping across all 6 stages
Starred Repositories Curated repos structured around Cybersecurity Technology
Cybersecurity Book List Books, labs, and companion repos grouped for practical learning, with cert roadmaps and learning paths
YouTube Channel Library Active channels across multiple security disciplines
X / Twitter Follow List Vetted accounts that regularly share original research, tooling, or operational insight
Career Paths 15+ cybersecurity roles with skill maps, salary ranges, cert roadmaps, and career transition paths
Certifications Reference Detailed reference for 40+ security certifications — cost, difficulty, DoD 8570, and who should pursue each
Hands-On Labs Free lab environments, CTF platforms, and home lab builds mapped to each security discipline
Security Tools Reference Quick-reference matrices of 100+ security tools organized by category with OSS/commercial tags
Frameworks Reference Side-by-side comparison of NIST CSF, 800-53, ISO 27001, SOC 2, PCI DSS, CMMC, GDPR, and 10+ other frameworks
Security Glossary 100+ cybersecurity terms, acronyms, and definitions from APT to ZTNA
Threat Actors Nation-state APTs, ransomware groups, and eCrime actors mapped to ATT&CK TTPs
IR Playbooks Step-by-step response procedures for ransomware, BEC, data exfiltration, DDoS, cloud incidents, and more
HTB Machine Index 127 retired HackTheBox machines indexed by difficulty, OS, and skills learned
Resources Books, courses, YouTube channels, podcasts, CTF platforms, and communities
HTB Learning Tracks 45 curated HackTheBox learning tracks mapped to disciplines and certification paths
Interview Prep Common interview questions by role — SOC analyst, pentester, DFIR, cloud security, AppSec
Home Lab Setup Hardware, hypervisors, network architecture, and detection stacks for building a security lab
Pentest Checklists Step-by-step checklists for external, internal, AD, web app, cloud, and post-exploitation testing
CTF Methodology Systematic approach to web, forensics, crypto, reverse engineering, binary exploitation, and OSINT challenges
Privilege Escalation Reference Linux and Windows privilege escalation techniques with ATT&CK mappings and automated tools
Cloud Attack Reference AWS, Azure, and GCP attack techniques, IAM escalation paths, and defensive controls
Network Attacks Reference ARP poisoning, VLAN hopping, LLMNR poisoning, MITM, network pivoting, tunneling, evasion techniques, and Scapy/Nmap reference
GRC Reference Security governance, risk management (FAIR), SOC 2, ISO 27001, PCI DSS, TPRM, compliance program management
Detection Rules Reference Sigma, YARA, and Suricata rule writing with examples and conversion to Splunk, Elastic, and Sentinel
Malware Families Ransomware, banking trojans, RATs, APT malware, rootkits, and loaders with TTPs and analysis resources
Enterprise Infrastructure Reference Every OS, server role, and network component encountered in enterprise environments — with security context and ATT&CK relevance
Open Source Toolkit Comprehensive open source security tooling reference and bookmarks organized by category across 20+ disciplines
Conference Talks & Papers Black Hat, DEF CON, BSides, CCC, USENIX, and landmark talk archives — with guidance on finding associated research repos
Security Metrics Reference SOC KPIs, vulnerability management SLAs, detection coverage scoring, risk metrics, and executive reporting frameworks
API Security Reference OWASP API Top 10, REST and GraphQL attack techniques, JWT attacks, SSRF, BOLA/BFLA, and API security testing methodology
Windows Hardening CIS benchmarks, GPO hardening, ASR rules, Defender for Endpoint, AppLocker/WDAC, and compliance scanning
Network Security Architecture DMZ design, VLAN segmentation, firewall policy, IDS/IPS placement, NAC/802.1X, DDoS protection, and network monitoring
Wireless Security Reference WiFi attacks (WPA2/WPA3, evil twin, PMKID), Bluetooth, SDR, RFID/NFC, and enterprise wireless hardening
Deception Technology Honeypots, honeytokens, canary tokens, deception platforms, breadcrumb strategy, and detection rules
Threat Intelligence Reference Intel lifecycle, STIX/TAXII, threat actor profiles, IOC enrichment, TIP platforms, and intelligence-driven detection
Container Security Docker hardening, Kubernetes security, OPA/Gatekeeper, Falco, SBOM, supply chain security, and SLSA
Cryptography Reference Symmetric/asymmetric crypto, TLS configuration, PKI, key management, post-quantum cryptography, and attack reference
Zero Trust Reference NIST SP 800-207, CISA ZTMM v2.0, identity/device/network/data pillars, ZTNA, micro-segmentation, and implementation roadmap
Networking Fundamentals OSI model, TCP/IP deep dive, subnetting, ARP/VLANs/STP, routing protocols, DNS, and network security architecture for security practitioners
Vendor Prevention Policies Authoritative policy settings from Microsoft (ASR/MDE), CrowdStrike, SentinelOne, Palo Alto, Proofpoint, Zscaler, CISA, NSA, Elastic, and Splunk
SIEM Detection Content Official detection rules from Sigma, Elastic, Splunk ESCU, Microsoft Sentinel, MITRE ATT&CK mitigations, CIS Controls, and DISA STIGs

Disciplines

Focused starting points by area of practice. Each page includes a learning path, free training resources, tools, books, certifications, and who to follow.

Discipline Focus
Threat Intelligence Collecting, analyzing, and acting on threat data to understand adversary capabilities and intent
Detection Engineering Building, tuning, and validating detections across log sources, SIEMs, and EDR platforms
Incident Response Responding to, containing, and recovering from security incidents
Offensive Security Penetration testing, red teaming, adversary emulation, and vulnerability research
Vulnerability Management Identifying, prioritizing, and remediating vulnerabilities across the environment
Cloud Security Securing cloud infrastructure, containers, serverless, and cloud identity
Network Security Monitoring and defending network traffic; NSM, IDS/IPS, Zero Trust networking
Malware Analysis Static and dynamic malware analysis, reverse engineering, and sandbox investigation
ICS / OT Security Securing industrial control systems, SCADA, PLCs, and critical infrastructure
Application Security Web/API security, secure SDLC, SAST/DAST, threat modeling, and bug bounty
Adversarial AI Attacks Attacking AI and ML systems — adversarial examples, model inversion, data poisoning, and LLM jailbreaks
AI & LLM Security Securing AI systems, red-teaming LLMs, prompt injection, and adversarial ML
Governance, Risk & Compliance Risk frameworks, compliance programs, NIST CSF/800-53, ISO 27001, GRC tooling
Hacker Hobbies & Community Locksport, SDR, electronics, badge hacking, ham radio, car hacking, DEF CON villages, and the broader hacker community
Digital Forensics Disk, memory, and network forensics; evidence handling; DFIR methodology
Security Architecture Zero Trust design, threat modeling, defense-in-depth, and architectural frameworks
DevSecOps Integrating security into CI/CD pipelines; SAST, SCA, IaC scanning, secrets detection
Cryptography & PKI Certificate lifecycle, key management, HSMs, TLS hardening, and post-quantum readiness
Supply Chain Security SBOM generation, artifact signing, dependency security, and SLSA framework
Privacy Engineering PII detection, data minimization, consent management, DSR automation, GDPR/CCPA
Identity & Access Management IAM/PAM architecture, SSO/MFA, Zero Trust identity, AD security, and CIEM
Security Operations SOC operations, SIEM/SOAR, threat hunting, detection lifecycle, and SOC metrics
Data Security Data classification, DLP, encryption, DSPM, and database activity monitoring
Active Defense & Deception Honeypots, honeytokens, canary tokens, deception grids, and adversary engagement
Hardware Security Firmware analysis, secure boot, TPM/HSM, hardware hacking, side-channel attacks
Mobile Security iOS/Android app security, MASVS, MDM/EMM, mobile threat defense, dynamic analysis
Purple Teaming Adversary emulation, BAS, detection validation, ATT&CK coverage measurement
Radio Frequency Security RF attack techniques, SDR tooling, replay attacks, protocol analysis, and wireless security testing
Bug Bounty Web/API/mobile vulnerability research, recon methodology, responsible disclosure
Social Engineering Phishing simulations, pretexting, vishing, security awareness training, human risk management
Physical Security Physical pen testing, RFID cloning, badge bypass, access control systems, facility security
Threat Modeling STRIDE/PASTA/LINDDUN methodologies, threat model as code, DFD-based analysis, DevSecOps integration
OSINT Open source intelligence collection, recon methodology, SOCMINT/GEOINT, OpSec for analysts
Zero Trust Architecture ZT principles, CISA ZTMM, microsegmentation, ZTNA tooling, BeyondCorp, NIST SP 800-207
IoT Security IoT attack surface, firmware analysis, MQTT/CoAP testing, device identity, OWASP IoT Top 10
Container & Kubernetes Security Container runtime security, K8s RBAC, image scanning, Falco, OPA Gatekeeper, CKS prep
Cyber Risk Quantification FAIR methodology, Monte Carlo simulation, ALE/ROSI calculation, board-level risk communication
Blockchain & Web3 Security Smart contract auditing, DeFi exploits, reentrancy, Slither/Echidna/Mythril, Ethernaut CTF
Security Awareness Phishing simulation, behavior change programs, KnowBe4/GoPhish, human risk metrics
Active Directory Security AD attack paths, Kerberoasting, DCSync, BloodHound, defensive controls, and detection strategies
AI / ML Security Adversarial ML, model inversion, data poisoning, MITRE ATLAS, and MLOps security
Exploit Development Buffer overflows, ROP chains, heap exploitation, format strings, fuzzing, and CVE research
Penetration Testing Scoping, methodology, CVSS scoring, tooling by phase, and report structure
Red Teaming APT simulation, C2 frameworks, payload evasion, infrastructure OPSEC, and engagement types
Reverse Engineering x86/x64 assembly, static/dynamic analysis, anti-analysis bypasses, and platform-specific RE
SIEM & SOAR SIEM architecture, SPL/KQL query writing, SOAR playbook design, and log source onboarding
Threat Hunting Hypothesis-driven hunting, ATT&CK-mapped procedures, Splunk/KQL queries, and maturity model

Free & Accessible Training

High-quality training does not require a large budget. These platforms offer free or pay-what-you-can content taught by working practitioners.

Platform Focus
Antisyphon Training Pay-what-you-can live courses from John Strand and practitioners; SOC, pentesting, active defense
Black Hills Information Security Hundreds of free webcasts on every security discipline
TCM Security Academy Free tier with 25+ hours of on-demand content; practical ethical hacking and SOC
PortSwigger Web Security Academy The best free web application security training available; interactive labs for every major vulnerability class
Hack The Box Academy Free Student tier; SOC analyst, DFIR, penetration testing, and cloud security paths
TryHackMe Browser-based beginner-to-advanced labs; no local setup required
IppSec HackTheBox walkthroughs demonstrating real attack techniques with full methodology
Blue Team Labs Online Free investigation challenges for detection, forensics, and IR
LetsDefend Free SOC simulator for alert triage and threat analysis
CISA Training Catalog No-cost federal training open to the public including ICS/OT, cloud, and IR content
Anthropic Courses Free AI and LLM security courses from Anthropic

Coverage & Data

Machine-readable data files and an ATT&CK Navigator layer connecting the TeamStarWolf vendor stack to NIST 800-53 controls and ATT&CK techniques.

Resource Description
ATT&CK Navigator Layer NIST 800-53 R5 → ATT&CK coverage heatmap (313 techniques, CTID-sourced). Load in Navigator ↗
Vendor → Control edges JSONL edge table: 100+ vendor → NIST 800-53 control mappings
Control → Technique edges JSONL edge table: NIST 800-53 R5 → ATT&CK technique mappings (CTID)
Vendor → Technique edges JSONL derived edge table: vendor → ATT&CK technique coverage via control join
Controls Mapping Full Vendor → NIST 800-53 → ATT&CK cross-reference
Coverage Schema Gap scoring data model, JSON schemas, Python scoring functions
OSINT Reference Reconnaissance methodology, domain/IP/people intelligence, GitHub OSINT, cloud asset discovery, and tools reference

Tool

Deploy to GitHub Pages

Docker Build

License: MIT

MITRE ATT&CK workbench for coverage review, detection engineering, exposure mapping, and threat-intelligence correlation. Supports Enterprise, ICS, and Mobile ATT&CK domains.

Capabilities

  • Multiple heatmap modes across coverage, detection, exposure, compliance, and risk

  • CVE mappings with live integrations: MISP, OpenCTI, EPSS, CISA KEV, NVD, Elastic, Splunk, Sigma, Atomic Red Team, ExploitDB, and Nuclei

  • STIX 2.1 import/export, custom technique editing, and collection sharing

  • Deployable via Docker or GitHub Pages

Repository | Live Site | Docs


Side Projects

Project Description
LimeWire Python desktop audio studio — download, analysis, editing, stem separation, and batch processing
PokeNav Offline-first Pokemon encyclopedia with game-aware browsing and trainer archives

Pinned Loading

  1. TeamStarWolf TeamStarWolf Public

    GitHub profile README for TeamStarWolf.

    Python 1

  2. ATTACK-Navi ATTACK-Navi Public

    ATTACK-Navi — Angular 19 MITRE ATT&CK workbench with 24 heatmap modes, MISP/OpenCTI integrations, and analyst workflows across coverage, exposure, detection, and defense.

    TypeScript 1