Browse Skills

Detecting Spearphishing With Email Gateway

v1.0.0

Spearphishing targets specific individuals using personalized, researched content that bypasses generic spam filters. Email security gateways (SEGs) like Microsoft Defender for Office 365, Proofpoint,

mukul975
3

Detecting Supply Chain Attacks In Ci Cd

v1.0.0

>

mukul975
3

Detecting Suspicious Oauth Application Consent

v1.0.0

Detect risky OAuth application consent grants in Azure AD / Microsoft Entra ID using Microsoft Graph API, audit logs, and permission analysis to identify illicit consent grant attacks.

mukul975
6

Detecting T1003 Credential Dumping With Edr

v1.0.0

Detect OS credential dumping techniques targeting LSASS memory, SAM database, NTDS.dit, and cached credentials using EDR telemetry, Sysmon process access monitoring, and Windows security event correlation.

mukul975
3

Executing Active Directory Attack Simulation

v1.0.0

>

mukul975
6

Executing Red Team Engagement Planning

v1.0.0

Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins.

mukul975
3

Exploiting Jwt Algorithm Confusion Attack

v1.0.0

>

mukul975
3

Exploiting Nopac Cve 2021 42278 42287

v1.0.0

Exploit the noPac vulnerability chain (CVE-2021-42278 sAMAccountName spoofing and CVE-2021-42287 KDC PAC confusion) to escalate from standard domain user to Domain Admin in Active Directory environments.

mukul975
3

Exploiting Oauth Misconfiguration

v1.0.0

Identifying and exploiting OAuth 2.0 and OpenID Connect misconfigurations including redirect URI manipulation, token leakage, and authorization code theft during security assessments.

mukul975
3

Exploiting Race Condition Vulnerabilities

v1.0.0

Detect and exploit race condition vulnerabilities in web applications using Turbo Intruder's single-packet attack technique to bypass rate limits, duplicate transactions, and exploit time-of-check-to-time-of-use flaws.

mukul975
5

Exploiting Vulnerabilities With Metasploit Framework

v1.0.0

The Metasploit Framework is the world's most widely used penetration testing platform, maintained by Rapid7. It contains over 2,300 exploits, 1,200 auxiliary modules, and 400 post-exploitation modules

mukul975
6

Exploiting Websocket Vulnerabilities

v1.0.0

Testing WebSocket implementations for authentication bypass, cross-site hijacking, injection attacks, and insecure message handling during authorized security assessments.

mukul975
4