Browse Skills

Securing Api Gateway With Aws Waf

v1.0.0

>

mukul975
4

Triaging Vulnerabilities With Ssvc Framework

v1.0.0

Triage and prioritize vulnerabilities using CISA's Stakeholder-Specific Vulnerability Categorization (SSVC) decision tree framework to produce actionable remediation priorities.

mukul975
4

Performing Initial Access With Evilginx3

v1.0.0

Perform authorized initial access using EvilGinx3 adversary-in-the-middle phishing framework to capture session tokens and bypass multi-factor authentication during red team engagements.

mukul975
5

Performing Lateral Movement With Wmiexec

v1.0.0

Perform lateral movement across Windows networks using WMI-based remote execution techniques including Impacket wmiexec.py, CrackMapExec, and native WMI commands for stealthy post-exploitation during red team engagements.

mukul975
1

Performing Memory Forensics With Volatility3 Plugins

v1.0.0

Analyze memory dumps using Volatility3 plugins to detect injected code, rootkits, credential theft, and malware artifacts in Windows, Linux, and macOS memory images.

mukul975
2

Performing Mobile App Certificate Pinning Bypass

v1.0.0

>

mukul975
5

Performing Mobile Device Forensics With Cellebrite

v1.0.0

Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications, location data, and application artifacts.

mukul975
3

Performing Nist Csf Maturity Assessment

v1.0.0

The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect,

mukul975
4

Performing Osint With Spiderfoot

v1.0.0

Automate OSINT collection using SpiderFoot REST API and CLI for target profiling, module-based reconnaissance, and structured result analysis across 200+ data sources

mukul975
5

Performing Privileged Account Discovery

v1.0.0

Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local admins, service accounts, database admins, cloud IAM roles, and application admin account

mukul975
3

Performing Red Team With Covenant

v1.0.0

Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener setup, grunt deployment, task execution, and lateral movement tracking.

mukul975
6

Performing Second Order Sql Injection

v1.0.0

Detect and exploit second-order SQL injection vulnerabilities where malicious input is stored in a database and later executed in an unsafe SQL query during a different application operation.

mukul975
4