Browse Skills
Implementing Threat Modeling With Mitre Attack
v1.0.0>
Implementing Velociraptor For Ir Collection
v1.0.0Deploy and configure Velociraptor for scalable endpoint forensic artifact collection during incident response using VQL queries, hunts, and pre-built artifact packs across Windows, Linux, and macOS environments.
Implementing Vulnerability Management With Greenbone
v1.0.0Deploy and operate Greenbone/OpenVAS vulnerability management using the python-gvm library to create scan targets, execute vulnerability scans, and parse scan reports via GMP protocol.
Implementing Zero Standing Privilege With Cyberark
v1.0.0Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using just-in-time access with time, entitlement, and approval controls.
Implementing Zero Trust With Beyondcorp
v1.0.0Deploy Google BeyondCorp Enterprise zero trust access controls using Identity-Aware Proxy (IAP), context-aware access policies, device trust validation, and Access Context Manager to enforce identity and posture-based access to GCP resources and internal applications.
Integrating Dast With Owasp Zap In Pipeline
v1.0.0>
Integrating Sast Into Github Actions Pipeline
v1.0.0>
Investigating Phishing Email Incident
v1.0.0>
Investigating Ransomware Attack Artifacts
v1.0.0Identify, collect, and analyze ransomware attack artifacts to determine the variant, initial access vector, encryption scope, and recovery options.
Mapping Mitre Attack Techniques
v1.0.0>
Performing Active Directory Bloodhound Analysis
v1.0.0Use BloodHound and SharpHound to enumerate Active Directory relationships and identify attack paths from compromised users to Domain Admin.
Performing Active Directory Forest Trust Attack
v1.0.0Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust key extraction, cross-forest SID history abuse detection, and inter-realm Kerberos ticket assessment.