Browse Skills
Exploiting Zerologon Vulnerability Cve 2020 1472
v1.0.0Exploit the Zerologon vulnerability (CVE-2020-1472) in the Netlogon Remote Protocol to achieve domain controller compromise by resetting the machine account password to empty.
Hardening Docker Containers For Production
v1.0.0Hardening Docker containers for production involves applying security best practices aligned with CIS Docker Benchmark v1.8.0 to minimize attack surface, prevent privilege escalation, and enforce leas
Hardening Docker Daemon Configuration
v1.0.0Harden the Docker daemon by configuring daemon.json with user namespace remapping, TLS authentication, rootless mode, and CIS benchmark controls.
Analyzing Ransomware Leak Site Intelligence
v1.0.0Monitor and analyze ransomware group data leak sites (DLS) to track victim postings, extract threat intelligence on group tactics, and assess sector-specific ransomware risk for proactive defense.
Analyzing Security Logs With Splunk
v1.0.0>
Analyzing Supply Chain Malware Artifacts
v1.0.0Investigate supply chain attack artifacts including trojanized software updates, compromised build pipelines, and sideloaded dependencies to identify intrusion vectors and scope of compromise.
Analyzing Threat Actor Ttps With Mitre Attack
v1.0.0MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations. This skill covers systematically mapping threat actor beh
Analyzing Threat Actor Ttps With Mitre Navigator
v1.0.0>
Auditing Kubernetes Cluster Rbac
v1.0.0>
Auditing Kubernetes Rbac Permissions
v1.0.0Kubernetes Role-Based Access Control (RBAC) auditing systematically reviews roles, cluster roles, bindings, and service account permissions to identify overly permissive access, privilege escalation p
Auditing Terraform Infrastructure For Security
v1.0.0>
Building Adversary Infrastructure Tracking System
v1.0.0Build an automated system to track adversary infrastructure using passive DNS, certificate transparency, WHOIS data, and IP enrichment to map and monitor threat actor command-and-control networks.