Browse Skills

Deploying Software Defined Perimeter

v1.0.0

Deploying Software Defined Perimeter

mukul975
3

Detecting Anomalies In Industrial Control Systems

v1.0.0

>

mukul975
4

Detecting Anomalous Authentication Patterns

v1.0.0

>

mukul975
2

Detecting Arp Poisoning In Network Traffic

v1.0.0

Detect and prevent ARP spoofing attacks using ARPWatch, Dynamic ARP Inspection, Wireshark analysis, and custom monitoring scripts to protect against man-in-the-middle interception.

mukul975
4

Detecting Attacks On Historian Servers

v1.0.0

>

mukul975
5

Detecting Attacks On Scada Systems

v1.0.0

>

mukul975
4

Detecting Aws Credential Exposure With Trufflehog

v1.0.0

>

mukul975
4

Detecting Aws Iam Privilege Escalation

v1.0.0

Detect AWS IAM privilege escalation paths using boto3 and Cloudsplaining policy analysis to identify overly permissive policies, dangerous permission combinations, and least-privilege violations

mukul975
4

Detecting Azure Service Principal Abuse

v1.0.0

Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin consent bypass, and unauthorized enumeration in Microsoft Entra ID environments.

mukul975
3

Detecting Beaconing Patterns With Zeek

v1.0.0

>

mukul975
4

Detecting Broken Object Property Level Authorization

v1.0.0

Detect and test for OWASP API3:2023 Broken Object Property Level Authorization vulnerabilities including excessive data exposure and mass assignment attacks.

mukul975
3

Detecting Cloud Cryptomining Activity

v1.0.0

>

mukul975
3