Browse Skills

Detecting Ransomware Precursors In Network

v1.0.0

>

mukul975
3

Detecting Rootkit Activity

v1.0.0

>

mukul975
5

Detecting S3 Data Exfiltration Attempts

v1.0.0

>

mukul975
4

Detecting Service Account Abuse

v1.0.0

Detect abuse of service accounts through anomalous interactive logons, privilege escalation, lateral movement, and unauthorized access patterns.

mukul975
3

Detecting Shadow It Cloud Usage

v1.0.0

Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow data using Python pandas for traffic pattern analysis and domain classification.

mukul975
3

Detecting Stuxnet Style Attacks

v1.0.0

>

mukul975
3

Detecting Suspicious Powershell Execution

v1.0.0

Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts, and constrained language mode evasion.

mukul975
4

Detecting T1055 Process Injection With Sysmon

v1.0.0

Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection by analyzing Sysmon events for cross-process memory operations, remote thread creation, and anomalous DLL loading patterns.

mukul975
2

Detecting T1548 Abuse Elevation Control Mechanism

v1.0.0

Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation by monitoring registry modifications, process elevation flags, and unusual parent-child process relationships.

mukul975
2

Detecting Wmi Persistence

v1.0.0

Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter, EventConsumer, and FilterToConsumerBinding creation.

mukul975
3

Eradicating Malware From Infected Systems

v1.0.0

Systematically remove malware, backdoors, and attacker persistence mechanisms from infected systems while ensuring complete eradication and preventing re-infection.

mukul975
6

Evaluating Threat Intelligence Platforms

v1.0.0

>

mukul975
3