Browse Skills
Performing Malware Triage With Yara
v1.0.0>
Performing Malware Persistence Investigation
v1.0.0Systematically investigate all persistence mechanisms on Windows and Linux systems to identify how malware survives reboots and maintains access.
Performing Malware Ioc Extraction
v1.0.0Malware IOC extraction is the process of analyzing malicious software to identify actionable indicators of compromise including file hashes, network indicators (C2 domains, IP addresses, URLs), regist
Performing Malware Hash Enrichment With Virustotal
v1.0.0Enrich malware file hashes using the VirusTotal API to retrieve detection rates, behavioral analysis, YARA matches, and contextual threat intelligence for incident triage and IOC validation.
Performing Log Source Onboarding In Siem
v1.0.0Perform structured log source onboarding into SIEM platforms by configuring collectors, parsers, normalization, and validation for complete security visibility.
Performing Log Analysis For Forensic Investigation
v1.0.0Collect, parse, and correlate system, application, and security logs to reconstruct events and establish timelines during forensic investigations.
Performing Linux Log Forensics Investigation
v1.0.0Perform forensic investigation of Linux system logs including syslog, auth.log, systemd journal, kern.log, and application logs to reconstruct user activity, detect unauthorized access, and establish event timelines on compromised Linux systems.
Performing Lateral Movement With Wmiexec
v1.0.0Perform lateral movement across Windows networks using WMI-based remote execution techniques including Impacket wmiexec.py, CrackMapExec, and native WMI commands for stealthy post-exploitation during red team engagements.
Performing Lateral Movement Detection
v1.0.0>
Performing Kubernetes Penetration Testing
v1.0.0Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against the API server, kubelet, etcd, pods, RBAC, network policies, and secrets. Using tools
Performing Kubernetes Etcd Security Assessment
v1.0.0Assess the security posture of Kubernetes etcd clusters by evaluating encryption at rest, TLS configuration, access controls, backup encryption, and network isolation.
Performing Kubernetes Cis Benchmark With Kube Bench
v1.0.0Audit Kubernetes cluster security posture against CIS benchmarks using kube-bench with automated checks for control plane, worker nodes, and RBAC.