Browse Skills

Performing Open Source Intelligence Gathering

v1.0.0

Open Source Intelligence (OSINT) gathering is the first active phase of a red team engagement, where operators collect publicly available information about the target organization to identify attack s

mukul975
2

Performing Oil Gas Cybersecurity Assessment

v1.0.0

>

mukul975
3

Performing Oauth Scope Minimization Review

v1.0.0

>

mukul975
3

Performing Nist Csf Maturity Assessment

v1.0.0

The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect,

mukul975
4

Performing Network Traffic Analysis With Zeek

v1.0.0

Deploy Zeek network security monitor to capture, parse, and analyze network traffic metadata for threat detection, anomaly identification, and forensic investigation.

mukul975
3

Performing Network Traffic Analysis With Tshark

v1.0.0

Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection, DNS anomaly identification, and IOC extraction from PCAP files

mukul975
3

Performing Network Packet Capture Analysis

v1.0.0

Perform forensic analysis of network packet captures (PCAP/PCAPNG) using Wireshark, tshark, and tcpdump to reconstruct network communications, extract transferred files, identify malicious traffic, and establish evidence of data exfiltration or command-and-control activity.

mukul975
3

Performing Network Forensics With Wireshark

v1.0.0

Capture and analyze network traffic using Wireshark and tshark to reconstruct network events, extract artifacts, and identify malicious communications.

mukul975
4

Performing Mobile Device Forensics With Cellebrite

v1.0.0

Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications, location data, and application artifacts.

mukul975
3

Performing Mobile App Certificate Pinning Bypass

v1.0.0

>

mukul975
5

Performing Memory Forensics With Volatility3 Plugins

v1.0.0

Analyze memory dumps using Volatility3 plugins to detect injected code, rootkits, credential theft, and malware artifacts in Windows, Linux, and macOS memory images.

mukul975
2

Performing Memory Forensics With Volatility3

v1.0.0

Analyze volatile memory dumps using Volatility 3 to extract running processes, network connections, loaded modules, and evidence of malicious activity.

mukul975
3