Skip to content
View Juwon1405's full-sized avatar
:octocat:
:octocat:
  • Tokyo
  • 12:07 (UTC +09:00)
  • Juwon1405 (Juwon Bang (ε„ͺεΏƒ)) Β· GitHubXFacebookLinkedInYouTube - github.com @Juwon1405_JP
  • Juwon1405 (Juwon Bang (ε„ͺεΏƒ)) Β· GitHubXFacebookLinkedInYouTube - github.com juwon1405
  • Juwon1405 (Juwon Bang (ε„ͺεΏƒ)) Β· GitHubXFacebookLinkedInYouTube - github.com in/juwon-bang-194b53252
  • Juwon1405 (Juwon Bang (ε„ͺεΏƒ)) Β· GitHubXFacebookLinkedInYouTube - github.com c/doubles1405

Block or report Juwon1405

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Juwon1405/README.md

Juwon Bang  (ε„ͺεΏƒ)

DFIR & Detection Engineering Β· Tokyo, Japan

email


Building autonomous detection systems and architectural security guarantees. Currently exploring agentic DFIR β€” MCP-based forensic agents that encode the reasoning pattern of a senior analyst as architecture, not as a prompt.

πŸ” Focus

  • Digital Forensics & Incident Response  Β·  Windows / macOS / Linux
  • Detection Engineering  Β·  MITRE ATT&CK coverage modeling, Sigma
  • DevSecOps & Security Automation
  • Agentic AI for Security  Β·  MCP, audit-chained reasoning loops

πŸ› οΈ Stack

πŸ“Œ Featured Projects

🎯 Agentic-DART  flagship β€” SANS FIND EVIL! 2026

Agentic-DART

Autonomous DFIR agent that thinks like a senior analyst. Architecture-first, not prompt-first. 60 typed forensic MCP tools (35 native + 25 SIFT Workstation adapters) across 11 / 12 MITRE ATT&CK tactics, 31 / 31 tests passing on a fresh clone (CI green on Python 3.10/3.11/3.12/3.13), 1182-line senior-analyst playbook v3 synthesizing Mandiant + Bianco + Diamond + Palantir ADS + MaGMa UCF + TaHiTI hunt cycle (42 references). Read-only MCP boundary makes destructive ops impossible by construction. Starts as agentic DFIR; designed to expand toward agentic SOC and beyond.

β†’ github.com/Juwon1405/agentic-dart  Β·  Submission to SANS FIND EVIL! 2026  Β·  MIT

Other projects

stars last commit shell

macOS DFIR Artifact Collector β€” single-file, zero-dep, modular collection script with selective module execution and supply-chain IOC sweeps (litellm PyPI 2026-03 + generic).

stars last commit python

macOS DFIR Forensics Platform β€” Flask-based platform that ingests collector ZIPs & disk images (DD/RAW/E01/AFF/DMG), parses 30+ artifact categories, and produces searchable evidence + PDF incident reports with optional Ollama / OpenAI analysis.

stars last commit python

GenDFIR RAG Pipeline β€” unofficial Python replication of Loumachi, Ghanem & Ferrag (2024). RAG + LLM pipeline for DFIR cyber-incident timeline analysis. Equation-by-equation, fully unit-tested.

πŸ““ GitNote

stars last commit markdown

GitNote β€” curated personal knowledge base in InfoSec & computer science. A long-running collection of notes, references, and code snippets from years of DFIR / detection engineering work.

πŸ“– Published Work

  • Network Attack Packet Analysis for Security Practitioners  Β·  λ³΄μ•ˆ μ‹€λ¬΄μžλ₯Ό μœ„ν•œ λ„€νŠΈμ›Œν¬ 곡격 νŒ¨ν‚· 뢄석  (co-author, lead)
    Freelec, 2019.11  Β·  ISBN 9788965402589  Β·  ~370 pp.
    A practitioner's reference covering DDoS, web exploitation, malicious traffic, wireless intrusion, system exploitation, and large-volume packet analysis.
    β†’ Yes24  Β·  Aladin  Β·  Kyobo  Β·  Google Books

πŸ† Selected Recognition

  • πŸ₯‡ Gold Prize, 2017 Korea Open-Source Software Developer Contest  (NIPA, national OSS award)
  • πŸ“œ Patent (filed): Security Event Correlation Analysis Apparatus  (2018, Netmarble Corp.)
  • 🎯 4th place, 2017 CCE National Cyber Defense Competition  (National Intelligence Service of Korea)
  • πŸ› Special Prize, 2015 LINE Bug Bounty Program  (LINE Corp.)

πŸŽ₯ Community

  • YouTube: DoubleS1405 β€” long-running Korean-language information-security lecture channel (2014–present)

πŸ“š Curated lists

  • Awesome Stars (GitNote) ⭐ β€” 204 starred repos categorized into 12 buckets (DFIR / Blue Team / AI / Red Team / Malware / OSINT / etc.), regenerated periodically.
  • DFIR β€” Digital Forensics & Incident Response
  • BlueTeam β€” Defensive operations & SOC
  • Tools & Tips β€” Analysis utilities
  • DevSecOps β€” Security automation & AI
  • Gist β€” Code snippets

🀝 Open to

Research collaboration Β· CTF Β· CSIRT exchange Β· Open-source security tooling


followers   stars   agentic-dart stars   agentic-dart CI

Pinned Loading

  1. agentic-dart agentic-dart Public

    Agentic-DART β€” autonomous detection & response agent. Architecture-first, not prompt-first. Starts as agentic DFIR; designed to expand toward agentic SOC and beyond.

    Python 4 4

  2. yushin-mac-artifact-collector yushin-mac-artifact-collector Public

    macOS DFIR Artifact Collector β€” single-file, zero-dependency, modular collection script with selective module execution and supply-chain IOC sweeps.

    Shell 1

  3. yushin-mac-forensics-platform yushin-mac-forensics-platform Public

    macOS DFIR Forensics Platform β€” Flask-based web platform that ingests collector ZIPs and disk images (DD/RAW/E01/AFF/DMG), parses 30+ artifact categories, and produces searchable evidence + PDF inc…

    Python 1

  4. yushin-gendfir-rag yushin-gendfir-rag Public

    Unofficial Python replication of Loumachi, Ghanem & Ferrag (2024) β€” RAG + LLM pipeline for DFIR cyber-incident timeline analysis. Equation-by-equation, fully unit-tested.

    Python 1

  5. timesketch timesketch Public

    Forked from google/timesketch

    Collaborative forensic timeline analysis

    Python 1

  6. Zircolite Zircolite Public

    Forked from wagga40/Zircolite

    A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs

    Python 1