Browse Skills

Implementing Threat Modeling With Mitre Attack

v1.0.0

>

mukul975
3

Implementing Velociraptor For Ir Collection

v1.0.0

Deploy and configure Velociraptor for scalable endpoint forensic artifact collection during incident response using VQL queries, hunts, and pre-built artifact packs across Windows, Linux, and macOS environments.

mukul975
3

Implementing Vulnerability Management With Greenbone

v1.0.0

Deploy and operate Greenbone/OpenVAS vulnerability management using the python-gvm library to create scan targets, execute vulnerability scans, and parse scan reports via GMP protocol.

mukul975
6

Implementing Zero Standing Privilege With Cyberark

v1.0.0

Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using just-in-time access with time, entitlement, and approval controls.

mukul975
4

Implementing Zero Trust With Beyondcorp

v1.0.0

Deploy Google BeyondCorp Enterprise zero trust access controls using Identity-Aware Proxy (IAP), context-aware access policies, device trust validation, and Access Context Manager to enforce identity and posture-based access to GCP resources and internal applications.

mukul975
3

Integrating Dast With Owasp Zap In Pipeline

v1.0.0

>

mukul975
2

Integrating Sast Into Github Actions Pipeline

v1.0.0

>

mukul975
3

Investigating Phishing Email Incident

v1.0.0

>

mukul975
3

Investigating Ransomware Attack Artifacts

v1.0.0

Identify, collect, and analyze ransomware attack artifacts to determine the variant, initial access vector, encryption scope, and recovery options.

mukul975
5

Mapping Mitre Attack Techniques

v1.0.0

>

mukul975
6

Performing Active Directory Bloodhound Analysis

v1.0.0

Use BloodHound and SharpHound to enumerate Active Directory relationships and identify attack paths from compromised users to Domain Admin.

mukul975
4

Performing Active Directory Forest Trust Attack

v1.0.0

Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust key extraction, cross-forest SID history abuse detection, and inter-realm Kerberos ticket assessment.

mukul975
4