Browse Skills

Performing Kerberoasting Attack

v1.0.0

Kerberoasting is a post-exploitation technique that targets service accounts in Active Directory by requesting Kerberos TGS (Ticket Granting Service) tickets for accounts with Service Principal Names

mukul975
5

Performing Jwt None Algorithm Attack

v1.0.0

Execute and test the JWT none algorithm attack to bypass signature verification by manipulating the alg header field in JSON Web Tokens.

mukul975
3

Performing Ip Reputation Analysis With Shodan

v1.0.0

Analyze IP address reputation using the Shodan API to identify open ports, running services, known vulnerabilities, and hosting context for threat intelligence enrichment and incident triage.

mukul975
3

Performing Iot Security Assessment

v1.0.0

>

mukul975
2

Performing Ioc Enrichment Automation

v1.0.0

>

mukul975
5

Performing Insider Threat Investigation

v1.0.0

>

mukul975
3

Performing Initial Access With Evilginx3

v1.0.0

Perform authorized initial access using EvilGinx3 adversary-in-the-middle phishing framework to capture session tokens and bypass multi-factor authentication during red team engagements.

mukul975
5

Performing Indicator Lifecycle Management

v1.0.0

Indicator lifecycle management tracks IOCs from initial discovery through validation, enrichment, deployment, monitoring, and eventual retirement. This skill covers implementing systematic processes f

mukul975
4

Performing Ics Asset Discovery With Claroty

v1.0.0

>

mukul975
2

Performing Http Parameter Pollution Attack

v1.0.0

Execute HTTP Parameter Pollution attacks to bypass input validation, WAF rules, and security controls by injecting duplicate parameters that are processed differently by front-end and back-end systems.

mukul975
5

Performing Hash Cracking With Hashcat

v1.0.0

Hash cracking is an essential skill for penetration testers and security auditors to evaluate password strength. Hashcat is the world's fastest password recovery tool, supporting over 300 hash types w

mukul975
5

Performing Hardware Security Module Integration

v1.0.0

Integrate Hardware Security Modules (HSMs) using PKCS#11 interface for cryptographic key management, signing operations, and secure key storage with python-pkcs11, AWS CloudHSM, and YubiHSM2.

mukul975
3