Skip to content
View Taresu's full-sized avatar
🏴‍☠️
Learning to learn
🏴‍☠️
Learning to learn
  • CMC
  • Curitiba, PR

Highlights

  • Pro

Block or report Taresu

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Taresu/README.md

TH4L3S $ S4L4T4

Typing SVG

Purple Team DevSecOps Cyber Kill Chain OWASP MITRE ATT&CK


LinkedIn Discord


Quick Navigation

Profile

$ whoami
th4l3s_s4l4t4

$ about --short
Information Systems student at UTFPR
DevOps Intern at Curitiba City Council
Purple Team practitioner in training: offense-informed defense

$ mission
Emulate attacks, validate detections, and harden systems.

I work at the intersection of offensive security, defensive monitoring, and infrastructure automation. My main interests are adversary emulation, detection engineering, web/network security, and security-focused DevOps workflows.

S.G.A.R.B.I
S -> Scan
G -> Gain Access
A -> Analyze Impact
R -> Report Clearly
B -> Build Defenses
I -> Improve Continuously

Current Work

[+] DevOps Intern.......................... Curitiba City Council
[+] Frontend Scholarship Holder............ UTFPR Portal
[+] Member................................. V.E.S.P.A.S (Cybersecurity Extension + CTF Team)
[+] Training............................... Offensive security and vulnerability research
[+] Ongoing Study.......................... Linux | Networking | Containers | Cloud

Purple Team Focus

Purple Team Operations Adversary Emulation Detection Engineering Threat Hunting Cyber Kill Chain Web App Security OWASP Top 10 MITRE ATT&CK Network Security

My work is guided by OWASP standards (including OWASP Top 10), MITRE ATT&CK, and the Cyber Kill Chain to map offensive findings into defensive improvements.

Methodology

1. Attack Surface Mapping -> enumerate assets, services, and weak points
2. Adversary Simulation   -> execute controlled attack paths and TTPs
3. Framework Mapping      -> align findings with OWASP Top 10, MITRE ATT&CK, and Cyber Kill Chain stages
4. Detection Validation   -> test SIEM/EDR coverage and alert quality
5. Reporting              -> deliver impact, evidence, and precise remediation
6. Hardening Loop         -> tune detections, improve controls, and retest

Tooling

Languages & Engineering

Python Node.js Java C React Tailwind CSS

Python/Bash     -> scripts, recon helpers, and automation
Java/C          -> systems fundamentals and low-level reasoning
React/Tailwind  -> internal tools and security-friendly interfaces

Security & Infrastructure Lab

Kali Linux Wireshark VirtualBox Vagrant Ansible

Wireshark            -> packet inspection and traffic analysis
VirtualBox/Vagrant   -> isolated pentest labs and reproducible environments
Ansible              -> secure configuration and automation

Core Kali Toolkit

Nmap Burp Suite Metasploit SQLmap Gobuster Nikto Wfuzz Hydra John the Ripper Hashcat

Recon/Enumeration -> Nmap, Gobuster, Nikto, Wfuzz
Web Testing       -> Burp Suite, SQLmap
Exploitation      -> Metasploit
Password Attacks  -> Hydra, John the Ripper, Hashcat

Detection & Blue Team Side

SIEM EDR Sigma Rules Splunk Elastic Wazuh Suricata Zeek

Detection Engineering -> Sigma rules, SIEM correlation, alert tuning
Telemetry Analysis    -> Splunk/Elastic dashboards and incident pivoting
Network Detection     -> Suricata/Zeek-based visibility and validation
Coverage Mapping      -> ATT&CK techniques and Cyber Kill Chain phases

GitHub Activity

GitHub Streak

[ operator_status: ONLINE ]

Attack-informed defense. Continuous purple teaming.

Pinned Loading

  1. Sistemas-Distribuidos Sistemas-Distribuidos Public

    Repositório criado para a disciplina de Sistemas Distribuídos, do curso de Bacharelado de Sistemas de Informação (BSI), da UTFPR - Curitiba, ministrado pela Profª. Ana Cristina Kochem.

    Python 1

  2. Sistemas_Operacionais Sistemas_Operacionais Public

    Repositório criado para a disciplina de Sistemas Operacionais, do curso de Bacharelado de Sistemas de Informação (BSI), da UTFPR - Curitiba, ministrado pelo Prof. Luis Nakamura.

  3. binary_search_tree binary_search_tree Public

    Árvore Binária de Busca, estrutura de dados baseada em nós, usada para armazenar e pesquisar elementos de maneira ordenada.

    C 1

  4. tree_algorithms tree_algorithms Public

    Árvore Binária, estrutura de dados não-linear e algoritmos.

    C

  5. priority_queues priority_queues Public

    Utilização do Tipo Abstrato de Dados (TAD) "heap", que funcionará como uma fila de prioridades.

    C 1

  6. ccs3_flexbox_projeto-dio ccs3_flexbox_projeto-dio Public

    Criação de uma Landing Page Responsiva, Projeto Final do curso "Posicionando elementos com Flexbox em CSS", da DIO.

    CSS 1