Skip to content
View Juwon1405's full-sized avatar
:octocat:
:octocat:

Block or report Juwon1405

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Juwon1405/README.md

Juwon Bang  (優心)

DFIR & Detection Engineering · Tokyo, Japan

email


Building autonomous detection systems and architectural security guarantees. Currently exploring agentic DFIR — MCP-based forensic agents that encode the reasoning pattern of a senior analyst as architecture, not as a prompt.

🔍 Focus

  • Digital Forensics & Incident Response  ·  Windows / macOS / Linux
  • Detection Engineering  ·  MITRE ATT&CK coverage modeling, Sigma
  • DevSecOps & Security Automation
  • Agentic AI for Security  ·  MCP, audit-chained reasoning loops

🛠️ Stack

📌 Featured Projects

🎯 Agentic-DART  flagship — SANS FIND EVIL! 2026

Agentic-DART

Autonomous DFIR agent that thinks like a senior analyst. Architecture-first, not prompt-first. 61 typed forensic MCP tools (36 native + 25 SIFT Workstation adapters) across 10 / 12 MITRE ATT&CK enterprise tactics (TA0009 Collection and TA0011 C2 are Phase 2 roadmap), 43 / 43 tests passing on a fresh clone (CI green on Python 3.10/3.11/3.12/3.13), 1182-line senior-analyst playbook v3 synthesizing Mandiant + Bianco + Diamond + Palantir ADS + MaGMa UCF + TaHiTI hunt cycle (42 references). Read-only MCP boundary makes destructive ops impossible by construction. Three evaluation tiers: synthetic reference (recall=1.0), noise-injected realistic at ~1:30 IOC:benign (recall=1.0), and NIST CFReDS Hacking Case (community-trusted external benchmark) — v0.5.4 scores 0.50/0.80 strict/lenient on 10 sampled NIST findings, up from v0.5.3's 0.10/0.40, after parse_registry_hive (issue #52) shipped. Remaining CFReDS gaps (#53/#54/#55) are explicit Phase 2 deliverables. Starts as agentic DFIR; designed to expand toward agentic SOC and beyond.

github.com/Juwon1405/agentic-dart  ·  Submission to SANS FIND EVIL! 2026  ·  MIT

Other projects

stars last commit shell

macOS DFIR Artifact Collector — single-file, zero-dep, modular collection script with selective module execution and supply-chain IOC sweeps (litellm PyPI 2026-03 + generic).

stars last commit python

macOS DFIR Forensics Platform — Flask-based platform that ingests collector ZIPs & disk images (DD/RAW/E01/AFF/DMG), parses 30+ artifact categories, and produces searchable evidence + PDF incident reports with optional Ollama / OpenAI analysis.

stars last commit python

GenDFIR RAG Pipeline — unofficial Python replication of Loumachi, Ghanem & Ferrag (2024). RAG + LLM pipeline for DFIR cyber-incident timeline analysis. Equation-by-equation, fully unit-tested.

📓 GitNote

stars last commit markdown

GitNote — curated personal knowledge base in InfoSec & computer science. A long-running collection of notes, references, and code snippets from years of DFIR / detection engineering work.

📖 Published Work

  • Network Attack Packet Analysis for Security Practitioners  ·  보안 실무자를 위한 네트워크 공격 패킷 분석  (co-author, lead)
    Freelec, 2019.11  ·  ISBN 9788965402589  ·  ~370 pp.
    A practitioner's reference covering DDoS, web exploitation, malicious traffic, wireless intrusion, system exploitation, and large-volume packet analysis.
    Yes24  ·  Aladin  ·  Kyobo  ·  Google Books

🏆 Selected Recognition

  • 🥇 Gold Prize, 2017 Korea Open-Source Software Developer Contest  (NIPA, national OSS award)
  • 📜 Patent (filed): Security Event Correlation Analysis Apparatus  (2018, Netmarble Corp.)
  • 🎯 4th place, 2017 CCE National Cyber Defense Competition  (National Intelligence Service of Korea)
  • 🐛 Special Prize, 2015 LINE Bug Bounty Program  (LINE Corp.)

🎥 Community

  • YouTube: DoubleS1405 — long-running Korean-language information-security lecture channel (2014–present)

📚 Curated lists

  • Awesome Stars (GitNote) ⭐ — 204 starred repos categorized into 12 buckets (DFIR / Blue Team / AI / Red Team / Malware / OSINT / etc.), regenerated periodically.
  • DFIR — Digital Forensics & Incident Response
  • BlueTeam — Defensive operations & SOC
  • Tools & Tips — Analysis utilities
  • DevSecOps — Security automation & AI
  • Gist — Code snippets

🤝 Open to

Research collaboration · CTF · CSIRT exchange · Open-source security tooling


followers   stars   agentic-dart stars   agentic-dart CI

Pinned Loading

  1. agentic-dart agentic-dart Public

    Agentic-DART — autonomous detection & response agent. Architecture-first, not prompt-first. Starts as agentic DFIR; designed to expand toward agentic SOC and beyond.

    Python 4 4

  2. yushin-mac-artifact-collector yushin-mac-artifact-collector Public

    macOS DFIR Artifact Collector — single-file, zero-dependency, modular collection script with selective module execution and supply-chain IOC sweeps.

    Shell 1

  3. yushin-mac-forensics-platform yushin-mac-forensics-platform Public

    macOS DFIR Forensics Platform — Flask-based web platform that ingests collector ZIPs and disk images (DD/RAW/E01/AFF/DMG), parses 30+ artifact categories, and produces searchable evidence + PDF inc…

    Python 1

  4. yushin-gendfir-rag yushin-gendfir-rag Public

    Unofficial Python replication of Loumachi, Ghanem & Ferrag (2024) — RAG + LLM pipeline for DFIR cyber-incident timeline analysis. Equation-by-equation, fully unit-tested.

    Python 1

  5. timesketch timesketch Public

    Forked from google/timesketch

    Collaborative forensic timeline analysis

    Python 1

  6. Zircolite Zircolite Public

    Forked from wagga40/Zircolite

    A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs

    Python 1