Browse Skills

Conducting Pass The Ticket Attack

v1.0.0

Pass-the-Ticket (PtT) is a lateral movement technique that uses stolen Kerberos tickets (TGT or TGS) to authenticate to services without knowing the user's password. By extracting Kerberos tickets fro

mukul975
3

Conducting Phishing Incident Response

v1.0.0

>

mukul975
4

Conducting Post Incident Lessons Learned

v1.0.0

Facilitate structured post-incident reviews to identify root causes, document what worked and failed, and produce actionable recommendations to improve future incident response.

mukul975
3

Conducting Social Engineering Penetration Test

v1.0.0

Design and execute a social engineering penetration test including phishing, vishing, smishing, and physical pretexting campaigns to measure human security resilience and identify training gaps.

mukul975
2

Conducting Social Engineering Pretext Call

v1.0.0

Plan and execute authorized vishing (voice phishing) pretext calls to assess employee susceptibility to social engineering and evaluate security awareness controls.

mukul975
6

Conducting Spearphishing Simulation Campaign

v1.0.0

Spearphishing simulation is a targeted social engineering attack vector used by red teams to gain initial access. Unlike broad phishing campaigns, spearphishing uses OSINT-derived intelligence to craf

mukul975
3

Configuring Active Directory Tiered Model

v1.0.0

Implement Microsoft's Enhanced Security Admin Environment (ESAE) tiered administration model for Active Directory. Covers Tier 0/1/2 separation, privileged access workstations (PAWs), administrative f

mukul975
4

Analyzing Apt Group With Mitre Navigator

v1.0.0

Analyze advanced persistent threat (APT) group techniques using MITRE ATT&CK Navigator to create layered heatmaps of adversary TTPs for detection gap analysis and threat-informed defense.

mukul975
3

Analyzing Certificate Transparency For Phishing

v1.0.0

Monitor Certificate Transparency logs using crt.sh and Certstream to detect phishing domains, lookalike certificates, and unauthorized certificate issuance targeting your organization.

mukul975
5

Analyzing Docker Container Forensics

v1.0.0

Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to identify malicious activity and evidence.

mukul975
5

Analyzing Ios App Security With Objection

v1.0.0

>

mukul975
5

Analyzing Kubernetes Audit Logs

v1.0.0

>

mukul975
3