Browse Skills
Performing Open Source Intelligence Gathering
v1.0.0Open Source Intelligence (OSINT) gathering is the first active phase of a red team engagement, where operators collect publicly available information about the target organization to identify attack s
Performing Oil Gas Cybersecurity Assessment
v1.0.0>
Performing Oauth Scope Minimization Review
v1.0.0>
Performing Nist Csf Maturity Assessment
v1.0.0The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect,
Performing Network Traffic Analysis With Zeek
v1.0.0Deploy Zeek network security monitor to capture, parse, and analyze network traffic metadata for threat detection, anomaly identification, and forensic investigation.
Performing Network Traffic Analysis With Tshark
v1.0.0Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection, DNS anomaly identification, and IOC extraction from PCAP files
Performing Network Packet Capture Analysis
v1.0.0Perform forensic analysis of network packet captures (PCAP/PCAPNG) using Wireshark, tshark, and tcpdump to reconstruct network communications, extract transferred files, identify malicious traffic, and establish evidence of data exfiltration or command-and-control activity.
Performing Network Forensics With Wireshark
v1.0.0Capture and analyze network traffic using Wireshark and tshark to reconstruct network events, extract artifacts, and identify malicious communications.
Performing Mobile Device Forensics With Cellebrite
v1.0.0Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications, location data, and application artifacts.
Performing Mobile App Certificate Pinning Bypass
v1.0.0>
Performing Memory Forensics With Volatility3 Plugins
v1.0.0Analyze memory dumps using Volatility3 plugins to detect injected code, rootkits, credential theft, and malware artifacts in Windows, Linux, and macOS memory images.
Performing Memory Forensics With Volatility3
v1.0.0Analyze volatile memory dumps using Volatility 3 to extract running processes, network connections, loaded modules, and evidence of malicious activity.