Browse Skills
Generating Threat Intelligence Reports
v1.0.0>
mukul975
3
Hardening Linux Endpoint With Cis Benchmark
v1.0.0>
mukul975
3
Hardening Windows Endpoint With Cis Benchmark
v1.0.0>
mukul975
4
Hunting Advanced Persistent Threats
v1.0.0>
mukul975
3
Hunting Credential Stuffing Attacks
v1.0.0>
mukul975
3
Hunting For Anomalous Powershell Execution
v1.0.0>
mukul975
2
Analyzing Prefetch Files For Execution History
v1.0.0Parse Windows Prefetch files to determine program execution history including run counts, timestamps, and referenced files for forensic investigation.
mukul975
4
Analyzing Ransomware Encryption Mechanisms
v1.0.0>
mukul975
3
Analyzing Ransomware Network Indicators
v1.0.0Identify ransomware network indicators including C2 beaconing patterns, TOR exit node connections, data exfiltration flows, and encryption key exchange via Zeek conn.log and NetFlow analysis
mukul975
3
Analyzing Threat Intelligence Feeds
v1.0.0>
mukul975
3
Analyzing Threat Landscape With Misp
v1.0.0>-
mukul975
3
Analyzing Tls Certificate Transparency Logs
v1.0.0>
mukul975
4