Browse Skills

Performing Sqlite Database Forensics

v1.0.0

Perform forensic analysis of SQLite databases to recover deleted records from freelists and WAL files, decode encoded timestamps, and extract evidence from browser history, messaging apps, and mobile device databases.

mukul975
3

Performing Thick Client Application Penetration Test

v1.0.0

Conduct a thick client application penetration test to identify insecure local storage, hardcoded credentials, DLL hijacking, memory manipulation, and insecure API communication in desktop applications using dnSpy, Procmon, and Burp Suite.

mukul975
3

Implementing Api Abuse Detection With Rate Limiting

v1.0.0

Implement API abuse detection using token bucket, sliding window, and adaptive rate limiting algorithms to prevent DDoS, brute force, and credential stuffing attacks.

mukul975
2

Implementing Api Rate Limiting And Throttling

v1.0.0

>

mukul975
2

Implementing Code Signing For Artifacts

v1.0.0

>

mukul975
2

Implementing Diamond Model Analysis

v1.0.0

The Diamond Model of Intrusion Analysis provides a structured framework for analyzing cyber intrusions by examining four core features: Adversary, Capability, Infrastructure, and Victim. This skill co

mukul975
4

Implementing Epss Score For Vulnerability Prioritization

v1.0.0

Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based on real-world exploitation probability within 30 days.

mukul975
3

Implementing Mobile Application Management

v1.0.0

>

mukul975
3

Implementing Policy As Code With Open Policy Agent

v1.0.0

>

mukul975
6

Implementing Privileged Identity Management With Azure

v1.0.0

Configure Azure AD Privileged Identity Management (PIM) using Microsoft Graph API to manage eligible role assignments, just-in-time activation, access reviews, and role management policies for zero-trust privileged access.

mukul975
3

Intercepting Mobile Traffic With Burpsuite

v1.0.0

>

mukul975
3

Performing Agentless Vulnerability Scanning

v1.0.0

Configure and execute agentless vulnerability scanning using network protocols, cloud snapshot analysis, and API-based discovery to assess systems without installing endpoint agents.

mukul975
3