Browse Skills
Analyzing Disk Image With Autopsy
v1.0.0Perform comprehensive forensic analysis of disk images using Autopsy to recover files, examine artifacts, and build investigation timelines.
Analyzing Dns Logs For Exfiltration
v1.0.0>
Analyzing Ethereum Smart Contract Vulnerabilities
v1.0.0Perform static and symbolic analysis of Solidity smart contracts using Slither and Mythril to detect reentrancy, integer overflow, access control, and other vulnerability classes before deployment to Ethereum mainnet.
Analyzing Golang Malware With Ghidra
v1.0.0Reverse engineer Go-compiled malware using Ghidra with specialized scripts for function recovery, string extraction, and type reconstruction in stripped Go binaries.
Analyzing Heap Spray Exploitation
v1.0.0Detect and analyze heap spray attacks in memory dumps using Volatility3 plugins to identify NOP sled patterns, shellcode landing zones, and suspicious large allocations in process virtual address space.
Analyzing Indicators Of Compromise
v1.0.0>
Analyzing Linux Elf Malware
v1.0.0>
Analyzing Linux Kernel Rootkits
v1.0.0Detect kernel-level rootkits in Linux memory dumps using Volatility3 linux plugins (check_syscall, lsmod, hidden_modules), rkhunter system scanning, and /proc vs /sys discrepancy analysis to identify hooked syscalls, hidden kernel modules, and tampered system structures.
Analyzing Linux System Artifacts
v1.0.0Examine Linux system artifacts including auth logs, cron jobs, shell history, and system configuration to uncover evidence of compromise or unauthorized activity.
Analyzing Lnk File And Jump List Artifacts
v1.0.0Analyze Windows LNK shortcut files and Jump List artifacts to establish evidence of file access, program execution, and user activity using LECmd, JLECmd, and manual binary parsing of the Shell Link Binary format.
Analyzing Macro Malware In Office Documents
v1.0.0>
Analyzing Malicious Url With Urlscan
v1.0.0URLScan.io is a free service for scanning and analyzing suspicious URLs. It captures screenshots, DOM content, HTTP transactions, JavaScript behavior, and network connections of web pages in an isolat