Browse Skills

Acquiring Disk Image With Dd And Dcfldd

v1.0.0

Create forensically sound bit-for-bit disk images using dd and dcfldd while preserving evidence integrity through hash verification.

mukul975
5

Analyzing Active Directory Acl Abuse

v1.0.0

Detect dangerous ACL misconfigurations in Active Directory using ldap3 to identify GenericAll, WriteDACL, and WriteOwner abuse paths

mukul975
2

Analyzing Azure Activity Logs For Threats

v1.0.0

>

mukul975
4

Analyzing Bootkit And Rootkit Samples

v1.0.0

>

mukul975
2

Analyzing Browser Forensics With Hindsight

v1.0.0

Analyze Chromium-based browser artifacts using Hindsight to extract browsing history, downloads, cookies, cached content, autofill data, saved passwords, and browser extensions from Chrome, Edge, Brave, and Opera for forensic investigation.

mukul975
4

Analyzing Campaign Attribution Evidence

v1.0.0

Campaign attribution analysis involves systematically evaluating evidence to determine which threat actor or group is responsible for a cyber operation. This skill covers collecting and weighting attr

mukul975
4

Analyzing Cloud Storage Access Patterns

v1.0.0

>-

mukul975
3

Analyzing Cobalt Strike Beacon Configuration

v1.0.0

Extract and analyze Cobalt Strike beacon configuration from PE files and memory dumps to identify C2 infrastructure, malleable profiles, and operator tradecraft.

mukul975
5

Analyzing Cobalt Strike Malleable Profiles

v1.0.0

>

mukul975
5

Analyzing Cobaltstrike Malleable C2 Profiles

v1.0.0

Parse and analyze Cobalt Strike Malleable C2 profiles using dissect.cobaltstrike and pyMalleableC2 to extract C2 indicators, detect evasion techniques, and generate network detection signatures.

mukul975
3

Analyzing Command And Control Communication

v1.0.0

>

mukul975
5

Analyzing Cyber Kill Chain

v1.0.0

>

mukul975
4