Browse Skills

Performing Malware Triage With Yara

v1.0.0

>

mukul975
2

Performing Malware Persistence Investigation

v1.0.0

Systematically investigate all persistence mechanisms on Windows and Linux systems to identify how malware survives reboots and maintains access.

mukul975
3

Performing Malware Ioc Extraction

v1.0.0

Malware IOC extraction is the process of analyzing malicious software to identify actionable indicators of compromise including file hashes, network indicators (C2 domains, IP addresses, URLs), regist

mukul975
3

Performing Malware Hash Enrichment With Virustotal

v1.0.0

Enrich malware file hashes using the VirusTotal API to retrieve detection rates, behavioral analysis, YARA matches, and contextual threat intelligence for incident triage and IOC validation.

mukul975
3

Performing Log Source Onboarding In Siem

v1.0.0

Perform structured log source onboarding into SIEM platforms by configuring collectors, parsers, normalization, and validation for complete security visibility.

mukul975
3

Performing Log Analysis For Forensic Investigation

v1.0.0

Collect, parse, and correlate system, application, and security logs to reconstruct events and establish timelines during forensic investigations.

mukul975
3

Performing Linux Log Forensics Investigation

v1.0.0

Perform forensic investigation of Linux system logs including syslog, auth.log, systemd journal, kern.log, and application logs to reconstruct user activity, detect unauthorized access, and establish event timelines on compromised Linux systems.

mukul975
3

Performing Lateral Movement With Wmiexec

v1.0.0

Perform lateral movement across Windows networks using WMI-based remote execution techniques including Impacket wmiexec.py, CrackMapExec, and native WMI commands for stealthy post-exploitation during red team engagements.

mukul975
1

Performing Lateral Movement Detection

v1.0.0

>

mukul975
3

Performing Kubernetes Penetration Testing

v1.0.0

Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against the API server, kubelet, etcd, pods, RBAC, network policies, and secrets. Using tools

mukul975
3

Performing Kubernetes Etcd Security Assessment

v1.0.0

Assess the security posture of Kubernetes etcd clusters by evaluating encryption at rest, TLS configuration, access controls, backup encryption, and network isolation.

mukul975
3

Performing Kubernetes Cis Benchmark With Kube Bench

v1.0.0

Audit Kubernetes cluster security posture against CIS benchmarks using kube-bench with automated checks for control plane, worker nodes, and RBAC.

mukul975
3