Browse Skills
Reverse Engineering Ios App With Frida
v1.0.0>
Reverse Engineering Dotnet Malware With Dnspy
v1.0.0>
Reverse Engineering Android Malware With Jadx
v1.0.0>
Remediating S3 Bucket Misconfiguration
v1.0.0>
Recovering From Ransomware Attack
v1.0.0>
Recovering Deleted Files With Photorec
v1.0.0Recover deleted files from disk images and storage media using PhotoRec's file signature-based carving engine regardless of file system damage.
Profiling Threat Actor Groups
v1.0.0>
Processing Stix Taxii Feeds
v1.0.0>
Prioritizing Vulnerabilities With Cvss Scoring
v1.0.0The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum of Incident Response and Security Teams) for assessing vulnerability severity. CVSS v4.0 (r
Performing Yara Rule Development For Detection
v1.0.0Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral indicators in executable files while minimizing false positives.
Performing Wireless Security Assessment With Kismet
v1.0.0Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak encryption, and unauthorized clients through passive RF monitoring.
Performing Wireless Network Penetration Test
v1.0.0Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3 keys, detecting rogue access points, and testing wireless segmentation using Aircrack-ng and related tools.