Browse Skills

Exploiting Kerberoasting With Impacket

v1.0.0

Perform Kerberoasting attacks using Impacket's GetUserSPNs to extract and crack Kerberos TGS tickets for Active Directory service accounts.

mukul975
6

Exploiting Nosql Injection Vulnerabilities

v1.0.0

Detect and exploit NoSQL injection vulnerabilities in MongoDB, CouchDB, and other NoSQL databases to demonstrate authentication bypass, data extraction, and unauthorized access risks.

mukul975
7

Exploiting Prototype Pollution In Javascript

v1.0.0

Detect and exploit JavaScript prototype pollution vulnerabilities on both client-side and server-side applications to achieve XSS, RCE, and authentication bypass through property injection.

mukul975
5

Exploiting Server Side Request Forgery

v1.0.0

Identifying and exploiting SSRF vulnerabilities to access internal services, cloud metadata, and restricted network resources during authorized penetration tests.

mukul975
2

Exploiting Smb Vulnerabilities With Metasploit

v1.0.0

>

mukul975
3

Exploiting Type Juggling Vulnerabilities

v1.0.0

Exploit PHP type juggling vulnerabilities caused by loose comparison operators to bypass authentication, circumvent hash verification, and manipulate application logic through type coercion attacks.

mukul975
4

Extracting Browser History Artifacts

v1.0.0

Extract and analyze browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge for forensic evidence of user web activity.

mukul975
6

Extracting Config From Agent Tesla Rat

v1.0.0

Extract embedded configuration from Agent Tesla RAT samples including SMTP/FTP/Telegram exfiltration credentials, keylogger settings, and C2 endpoints using .NET decompilation and memory analysis.

mukul975
4

Extracting Credentials From Memory Dump

v1.0.0

Extract cached credentials, password hashes, Kerberos tickets, and authentication tokens from memory dumps using Volatility and Mimikatz for forensic investigation.

mukul975
4

Extracting Iocs From Malware Samples

v1.0.0

>

mukul975
5

Extracting Memory Artifacts With Rekall

v1.0.0

>

mukul975
2

Extracting Windows Event Logs Artifacts

v1.0.0

Extract, parse, and analyze Windows Event Logs (EVTX) using Chainsaw, Hayabusa, and EvtxECmd to detect lateral movement, persistence, and privilege escalation.

mukul975
3