Browse Skills
Detecting Ransomware Precursors In Network
v1.0.0>
Detecting Rootkit Activity
v1.0.0>
Detecting S3 Data Exfiltration Attempts
v1.0.0>
Detecting Service Account Abuse
v1.0.0Detect abuse of service accounts through anomalous interactive logons, privilege escalation, lateral movement, and unauthorized access patterns.
Detecting Shadow It Cloud Usage
v1.0.0Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow data using Python pandas for traffic pattern analysis and domain classification.
Detecting Stuxnet Style Attacks
v1.0.0>
Detecting Suspicious Powershell Execution
v1.0.0Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts, and constrained language mode evasion.
Detecting T1055 Process Injection With Sysmon
v1.0.0Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection by analyzing Sysmon events for cross-process memory operations, remote thread creation, and anomalous DLL loading patterns.
Detecting T1548 Abuse Elevation Control Mechanism
v1.0.0Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation by monitoring registry modifications, process elevation flags, and unusual parent-child process relationships.
Detecting Wmi Persistence
v1.0.0Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter, EventConsumer, and FilterToConsumerBinding creation.
Eradicating Malware From Infected Systems
v1.0.0Systematically remove malware, backdoors, and attacker persistence mechanisms from infected systems while ensuring complete eradication and preventing re-infection.
Evaluating Threat Intelligence Platforms
v1.0.0>