Browse Skills
Acquiring Disk Image With Dd And Dcfldd
v1.0.0Create forensically sound bit-for-bit disk images using dd and dcfldd while preserving evidence integrity through hash verification.
Analyzing Active Directory Acl Abuse
v1.0.0Detect dangerous ACL misconfigurations in Active Directory using ldap3 to identify GenericAll, WriteDACL, and WriteOwner abuse paths
Analyzing Azure Activity Logs For Threats
v1.0.0>
Analyzing Bootkit And Rootkit Samples
v1.0.0>
Analyzing Browser Forensics With Hindsight
v1.0.0Analyze Chromium-based browser artifacts using Hindsight to extract browsing history, downloads, cookies, cached content, autofill data, saved passwords, and browser extensions from Chrome, Edge, Brave, and Opera for forensic investigation.
Analyzing Campaign Attribution Evidence
v1.0.0Campaign attribution analysis involves systematically evaluating evidence to determine which threat actor or group is responsible for a cyber operation. This skill covers collecting and weighting attr
Analyzing Cloud Storage Access Patterns
v1.0.0>-
Analyzing Cobalt Strike Beacon Configuration
v1.0.0Extract and analyze Cobalt Strike beacon configuration from PE files and memory dumps to identify C2 infrastructure, malleable profiles, and operator tradecraft.
Analyzing Cobalt Strike Malleable Profiles
v1.0.0>
Analyzing Cobaltstrike Malleable C2 Profiles
v1.0.0Parse and analyze Cobalt Strike Malleable C2 profiles using dissect.cobaltstrike and pyMalleableC2 to extract C2 indicators, detect evasion techniques, and generate network detection signatures.
Analyzing Command And Control Communication
v1.0.0>
Analyzing Cyber Kill Chain
v1.0.0>