Browse Skills

Performing Ip Reputation Analysis With Shodan

v1.0.0

Analyze IP address reputation using the Shodan API to identify open ports, running services, known vulnerabilities, and hosting context for threat intelligence enrichment and incident triage.

mukul975
3

Performing Jwt None Algorithm Attack

v1.0.0

Execute and test the JWT none algorithm attack to bypass signature verification by manipulating the alg header field in JSON Web Tokens.

mukul975
3

Performing Kerberoasting Attack

v1.0.0

Kerberoasting is a post-exploitation technique that targets service accounts in Active Directory by requesting Kerberos TGS (Ticket Granting Service) tickets for accounts with Service Principal Names

mukul975
5

Performing Kubernetes Cis Benchmark With Kube Bench

v1.0.0

Audit Kubernetes cluster security posture against CIS benchmarks using kube-bench with automated checks for control plane, worker nodes, and RBAC.

mukul975
3

Performing Kubernetes Etcd Security Assessment

v1.0.0

Assess the security posture of Kubernetes etcd clusters by evaluating encryption at rest, TLS configuration, access controls, backup encryption, and network isolation.

mukul975
3

Performing Kubernetes Penetration Testing

v1.0.0

Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against the API server, kubelet, etcd, pods, RBAC, network policies, and secrets. Using tools

mukul975
3

Performing Log Analysis For Forensic Investigation

v1.0.0

Collect, parse, and correlate system, application, and security logs to reconstruct events and establish timelines during forensic investigations.

mukul975
3

Performing Log Source Onboarding In Siem

v1.0.0

Perform structured log source onboarding into SIEM platforms by configuring collectors, parsers, normalization, and validation for complete security visibility.

mukul975
3

Performing Malware Hash Enrichment With Virustotal

v1.0.0

Enrich malware file hashes using the VirusTotal API to retrieve detection rates, behavioral analysis, YARA matches, and contextual threat intelligence for incident triage and IOC validation.

mukul975
3

Performing Network Traffic Analysis With Zeek

v1.0.0

Deploy Zeek network security monitor to capture, parse, and analyze network traffic metadata for threat detection, anomaly identification, and forensic investigation.

mukul975
3

Performing Open Source Intelligence Gathering

v1.0.0

Open Source Intelligence (OSINT) gathering is the first active phase of a red team engagement, where operators collect publicly available information about the target organization to identify attack s

mukul975
2

Performing Ot Network Security Assessment

v1.0.0

>

mukul975
5