Browse Skills

Performing Second Order Sql Injection

v1.0.0

Detect and exploit second-order SQL injection vulnerabilities where malicious input is stored in a database and later executed in an unsafe SQL query during a different application operation.

mukul975
4

Performing Scada Hmi Security Assessment

v1.0.0

>

mukul975
3

Performing Sca Dependency Scanning With Snyk

v1.0.0

>

mukul975
6

Performing S7comm Protocol Security Analysis

v1.0.0

>

mukul975
3

Performing Red Team With Covenant

v1.0.0

Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener setup, grunt deployment, task execution, and lateral movement tracking.

mukul975
6

Performing Red Team Phishing With Gophish

v1.0.0

>-

mukul975
5

Performing Ransomware Tabletop Exercise

v1.0.0

>

mukul975
3

Performing Ransomware Response

v1.0.0

>

mukul975
5

Performing Ransomware Incident Response

v1.0.0

Execute a structured ransomware incident response including containment, decryption assessment, recovery from backups, and eradication of ransomware persistence mechanisms.

mukul975
3

Performing Purple Team Exercise

v1.0.0

>

mukul975
3

Performing Privileged Account Discovery

v1.0.0

Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local admins, service accounts, database admins, cloud IAM roles, and application admin account

mukul975
3

Performing Privileged Account Access Review

v1.0.0

Conduct systematic reviews of privileged accounts to validate access rights, identify excessive permissions, and enforce least privilege across PAM infrastructure.

mukul975
2