Browse Skills

Hunting For Living Off The Land Binaries

v1.0.0

Proactively hunt for adversary abuse of legitimate system binaries (LOLBins) to execute malicious payloads while evading detection.

mukul975
3

Hunting For Lolbins Execution In Endpoint Logs

v1.0.0

Hunt for adversary abuse of Living Off the Land Binaries (LOLBins) by analyzing endpoint process creation logs for suspicious execution patterns of legitimate Windows system binaries used for malicious purposes.

mukul975
4

Hunting For Ntlm Relay Attacks

v1.0.0

Detect NTLM relay attacks by analyzing Windows Event 4624 logon type 3 with NTLMSSP authentication, identifying IP-to-hostname mismatches, Responder traffic signatures, SMB signing status, and suspicious authentication patterns across the domain.

mukul975
6

Hunting For Persistence Mechanisms In Windows

v1.0.0

Systematically hunt for adversary persistence mechanisms across Windows endpoints including registry, services, startup folders, and WMI subscriptions.

mukul975
4

Hunting For Process Injection Techniques

v1.0.0

Detect process injection techniques (T1055) including CreateRemoteThread, process hollowing, and DLL injection via Sysmon Event IDs 8 and 10 and EDR process telemetry

mukul975
6

Hunting For Registry Persistence Mechanisms

v1.0.0

Hunt for registry-based persistence mechanisms including Run keys, Winlogon modifications, IFEO injection, and COM hijacking in Windows environments.

mukul975
3

Hunting For Scheduled Task Persistence

v1.0.0

Hunt for adversary persistence via Windows Scheduled Tasks by analyzing task creation events, suspicious task actions, and unusual scheduling patterns.

mukul975
2

Hunting For Shadow Copy Deletion

v1.0.0

Hunt for Volume Shadow Copy deletion activity that indicates ransomware preparation or anti-forensics by monitoring vssadmin, wmic, and PowerShell shadow copy commands.

mukul975
3

Hunting For Startup Folder Persistence

v1.0.0

Detect T1547.001 startup folder persistence by monitoring Windows startup directories for suspicious file creation, analyzing autoruns entries, and using Python watchdog for real-time filesystem monitoring.

mukul975
2

Hunting For Suspicious Scheduled Tasks

v1.0.0

Hunt for adversary persistence and execution via Windows scheduled tasks by analyzing task creation events, suspicious task properties, and unusual execution patterns that indicate T1053.005 abuse.

mukul975
2

Hunting For Unusual Network Connections

v1.0.0

Hunt for unusual network connections by analyzing outbound traffic patterns, rare destinations, non-standard ports, and anomalous connection frequencies from endpoints.

mukul975
3

Hunting For Webshell Activity

v1.0.0

Hunt for web shell deployments on internet-facing servers by analyzing file creation in web directories, suspicious process spawning from web servers, and anomalous HTTP patterns.

mukul975
2