Browse Skills

Building Vulnerability Exception Tracking System

v1.0.0

Build a vulnerability exception and risk acceptance tracking system with approval workflows, compensating controls documentation, and expiration management.

mukul975
5

Collecting Indicators Of Compromise

v1.0.0

>

mukul975
3

Collecting Open Source Intelligence

v1.0.0

>

mukul975
3

Collecting Threat Intelligence With Misp

v1.0.0

MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform for gathering, sharing, storing, and correlating Indicators of Compromise (IOCs) of targeted attacks, threat

mukul975
3

Collecting Volatile Evidence From Compromised Host

v1.0.0

Collect volatile forensic evidence from a compromised system following order of volatility, preserving memory, network connections, processes, and system state before they are lost.

mukul975
5

Conducting Domain Persistence With Dcsync

v1.0.0

Perform DCSync attacks to replicate Active Directory credentials and establish domain persistence by extracting KRBTGT, Domain Admin, and service account hashes for Golden Ticket creation.

mukul975
3

Conducting External Reconnaissance With Osint

v1.0.0

>

mukul975
2

Conducting Internal Network Penetration Test

v1.0.0

Execute an internal network penetration test simulating an insider threat or post-breach attacker to identify lateral movement paths, privilege escalation vectors, and sensitive data exposure within the corporate network.

mukul975
5

Conducting Memory Forensics With Volatility

v1.0.0

>

mukul975
3

Conducting Network Penetration Test

v1.0.0

>

mukul975
3

Conducting Wireless Network Penetration Test

v1.0.0

>

mukul975
3

Configuring Aws Verified Access For Ztna

v1.0.0

Configure AWS Verified Access to provide VPN-less zero trust network access to internal applications using identity and device posture verification with Cedar policy language.

mukul975
5