Browse Skills
Analyzing Malware Behavior With Cuckoo Sandbox
v1.0.0>
Analyzing Malware Persistence With Autoruns
v1.0.0Use Sysinternals Autoruns to systematically identify and analyze malware persistence mechanisms across registry keys, scheduled tasks, services, drivers, and startup locations on Windows systems.
Analyzing Malware Sandbox Evasion Techniques
v1.0.0Detect sandbox evasion techniques in malware samples by analyzing timing checks, VM artifact queries, user interaction detection, and sleep inflation patterns from Cuckoo/AnyRun behavioral reports
Analyzing Memory Dumps With Volatility
v1.0.0>
Analyzing Memory Forensics With Lime And Volatility
v1.0.0>
Analyzing Network Covert Channels In Malware
v1.0.0Detect and analyze covert communication channels used by malware including DNS tunneling, ICMP exfiltration, steganographic HTTP, and protocol abuse for C2 and data exfiltration.
Analyzing Network Flow Data With Netflow
v1.0.0>-
Analyzing Network Traffic For Incidents
v1.0.0>
Analyzing Network Traffic Of Malware
v1.0.0>
Analyzing Network Traffic With Wireshark
v1.0.0>
Analyzing Packed Malware With Upx Unpacker
v1.0.0>
Analyzing Persistence Mechanisms In Linux
v1.0.0Detect and analyze Linux persistence mechanisms including crontab entries, systemd service units, LD_PRELOAD hijacking, bashrc modifications, and authorized_keys backdoors using auditd and file integrity monitoring