Browse Skills

Securing Remote Access To Ot Environment

v1.0.0

>

mukul975
5

Securing Serverless Functions

v1.0.0

>

mukul975
4

Tracking Threat Actor Infrastructure

v1.0.0

Threat actor infrastructure tracking involves monitoring and mapping adversary-controlled assets including command-and-control (C2) servers, phishing domains, exploit kit hosts, bulletproof hosting, a

mukul975
2

Performing Endpoint Vulnerability Remediation

v1.0.0

>

mukul975
3

Performing Entitlement Review With Sailpoint Iiq

v1.0.0

>

mukul975
3

Performing External Network Penetration Test

v1.0.0

Conduct a comprehensive external network penetration test to identify vulnerabilities in internet-facing infrastructure using PTES methodology, reconnaissance, scanning, exploitation, and reporting.

mukul975
2

Performing False Positive Reduction In Siem

v1.0.0

Perform systematic SIEM false positive reduction through rule tuning, threshold adjustment, correlation refinement, and threat intelligence enrichment to combat alert fatigue.

mukul975
5

Performing File Carving With Foremost

v1.0.0

Recover files from disk images and unallocated space using Foremost's header-footer signature carving to extract evidence regardless of file system state.

mukul975
4

Performing Firmware Malware Analysis

v1.0.0

>

mukul975
4

Performing Fuzzing With Aflplusplus

v1.0.0

>

mukul975
4

Performing Ics Asset Discovery With Claroty

v1.0.0

>

mukul975
2

Performing Indicator Lifecycle Management

v1.0.0

Indicator lifecycle management tracks IOCs from initial discovery through validation, enrichment, deployment, monitoring, and eventual retirement. This skill covers implementing systematic processes f

mukul975
4