Browse Skills
Performing Insider Threat Investigation
v1.0.0>
Performing Ioc Enrichment Automation
v1.0.0>
Performing Lateral Movement Detection
v1.0.0>
Performing Malware Ioc Extraction
v1.0.0Malware IOC extraction is the process of analyzing malicious software to identify actionable indicators of compromise including file hashes, network indicators (C2 domains, IP addresses, URLs), regist
Performing Malware Persistence Investigation
v1.0.0Systematically investigate all persistence mechanisms on Windows and Linux systems to identify how malware survives reboots and maintains access.
Performing Malware Triage With Yara
v1.0.0>
Performing Memory Forensics With Volatility3
v1.0.0Analyze volatile memory dumps using Volatility 3 to extract running processes, network connections, loaded modules, and evidence of malicious activity.
Performing Network Forensics With Wireshark
v1.0.0Capture and analyze network traffic using Wireshark and tshark to reconstruct network events, extract artifacts, and identify malicious communications.
Performing Network Packet Capture Analysis
v1.0.0Perform forensic analysis of network packet captures (PCAP/PCAPNG) using Wireshark, tshark, and tcpdump to reconstruct network communications, extract transferred files, identify malicious traffic, and establish evidence of data exfiltration or command-and-control activity.
Performing Network Traffic Analysis With Tshark
v1.0.0Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection, DNS anomaly identification, and IOC extraction from PCAP files
Performing Oauth Scope Minimization Review
v1.0.0>
Performing Oil Gas Cybersecurity Assessment
v1.0.0>