Browse Skills

Performing Insider Threat Investigation

v1.0.0

>

mukul975
3

Performing Ioc Enrichment Automation

v1.0.0

>

mukul975
5

Performing Lateral Movement Detection

v1.0.0

>

mukul975
3

Performing Malware Ioc Extraction

v1.0.0

Malware IOC extraction is the process of analyzing malicious software to identify actionable indicators of compromise including file hashes, network indicators (C2 domains, IP addresses, URLs), regist

mukul975
3

Performing Malware Persistence Investigation

v1.0.0

Systematically investigate all persistence mechanisms on Windows and Linux systems to identify how malware survives reboots and maintains access.

mukul975
3

Performing Malware Triage With Yara

v1.0.0

>

mukul975
2

Performing Memory Forensics With Volatility3

v1.0.0

Analyze volatile memory dumps using Volatility 3 to extract running processes, network connections, loaded modules, and evidence of malicious activity.

mukul975
3

Performing Network Forensics With Wireshark

v1.0.0

Capture and analyze network traffic using Wireshark and tshark to reconstruct network events, extract artifacts, and identify malicious communications.

mukul975
4

Performing Network Packet Capture Analysis

v1.0.0

Perform forensic analysis of network packet captures (PCAP/PCAPNG) using Wireshark, tshark, and tcpdump to reconstruct network communications, extract transferred files, identify malicious traffic, and establish evidence of data exfiltration or command-and-control activity.

mukul975
3

Performing Network Traffic Analysis With Tshark

v1.0.0

Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection, DNS anomaly identification, and IOC extraction from PCAP files

mukul975
3

Performing Oauth Scope Minimization Review

v1.0.0

>

mukul975
3

Performing Oil Gas Cybersecurity Assessment

v1.0.0

>

mukul975
3