Browse Skills

Analyzing Malware Behavior With Cuckoo Sandbox

v1.0.0

>

mukul975
3

Analyzing Malware Persistence With Autoruns

v1.0.0

Use Sysinternals Autoruns to systematically identify and analyze malware persistence mechanisms across registry keys, scheduled tasks, services, drivers, and startup locations on Windows systems.

mukul975
4

Analyzing Malware Sandbox Evasion Techniques

v1.0.0

Detect sandbox evasion techniques in malware samples by analyzing timing checks, VM artifact queries, user interaction detection, and sleep inflation patterns from Cuckoo/AnyRun behavioral reports

mukul975
5

Analyzing Memory Dumps With Volatility

v1.0.0

>

mukul975
3

Analyzing Memory Forensics With Lime And Volatility

v1.0.0

>

mukul975
3

Analyzing Network Covert Channels In Malware

v1.0.0

Detect and analyze covert communication channels used by malware including DNS tunneling, ICMP exfiltration, steganographic HTTP, and protocol abuse for C2 and data exfiltration.

mukul975
4

Analyzing Network Flow Data With Netflow

v1.0.0

>-

mukul975
2

Analyzing Network Traffic For Incidents

v1.0.0

>

mukul975
4

Analyzing Network Traffic Of Malware

v1.0.0

>

mukul975
3

Analyzing Network Traffic With Wireshark

v1.0.0

>

mukul975
4

Analyzing Packed Malware With Upx Unpacker

v1.0.0

>

mukul975
3

Analyzing Persistence Mechanisms In Linux

v1.0.0

Detect and analyze Linux persistence mechanisms including crontab entries, systemd service units, LD_PRELOAD hijacking, bashrc modifications, and authorized_keys backdoors using auditd and file integrity monitoring

mukul975
5