Browse Skills
Conducting Pass The Ticket Attack
v1.0.0Pass-the-Ticket (PtT) is a lateral movement technique that uses stolen Kerberos tickets (TGT or TGS) to authenticate to services without knowing the user's password. By extracting Kerberos tickets fro
Conducting Phishing Incident Response
v1.0.0>
Conducting Post Incident Lessons Learned
v1.0.0Facilitate structured post-incident reviews to identify root causes, document what worked and failed, and produce actionable recommendations to improve future incident response.
Conducting Social Engineering Penetration Test
v1.0.0Design and execute a social engineering penetration test including phishing, vishing, smishing, and physical pretexting campaigns to measure human security resilience and identify training gaps.
Conducting Social Engineering Pretext Call
v1.0.0Plan and execute authorized vishing (voice phishing) pretext calls to assess employee susceptibility to social engineering and evaluate security awareness controls.
Conducting Spearphishing Simulation Campaign
v1.0.0Spearphishing simulation is a targeted social engineering attack vector used by red teams to gain initial access. Unlike broad phishing campaigns, spearphishing uses OSINT-derived intelligence to craf
Configuring Active Directory Tiered Model
v1.0.0Implement Microsoft's Enhanced Security Admin Environment (ESAE) tiered administration model for Active Directory. Covers Tier 0/1/2 separation, privileged access workstations (PAWs), administrative f
Analyzing Apt Group With Mitre Navigator
v1.0.0Analyze advanced persistent threat (APT) group techniques using MITRE ATT&CK Navigator to create layered heatmaps of adversary TTPs for detection gap analysis and threat-informed defense.
Analyzing Certificate Transparency For Phishing
v1.0.0Monitor Certificate Transparency logs using crt.sh and Certstream to detect phishing domains, lookalike certificates, and unauthorized certificate issuance targeting your organization.
Analyzing Docker Container Forensics
v1.0.0Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to identify malicious activity and evidence.
Analyzing Ios App Security With Objection
v1.0.0>
Analyzing Kubernetes Audit Logs
v1.0.0>