Browse Skills

Performing Cloud Forensics With Aws Cloudtrail

v1.0.0

Perform forensic investigation of AWS environments using CloudTrail logs to reconstruct attacker activity, identify compromised credentials, and analyze API call patterns.

mukul975
4

Performing Cloud Forensics Investigation

v1.0.0

Conduct forensic investigations in cloud environments by collecting and analyzing logs, snapshots, and metadata from AWS, Azure, and GCP services.

mukul975
6

Performing Cloud Asset Inventory With Cartography

v1.0.0

Perform comprehensive cloud asset inventory and relationship mapping using Cartography to build a Neo4j security graph of infrastructure assets, IAM permissions, and attack paths across AWS, GCP, and Azure.

mukul975
4

Performing Clickjacking Attack Test

v1.0.0

Testing web applications for clickjacking vulnerabilities by assessing frame embedding controls and crafting proof-of-concept overlay attacks during authorized security assessments.

mukul975
3

Performing Brand Monitoring For Impersonation

v1.0.0

Monitor for brand impersonation attacks across domains, social media, mobile apps, and dark web channels to detect phishing campaigns, fake sites, and unauthorized brand usage targeting your organization.

mukul975
3

Performing Bluetooth Security Assessment

v1.0.0

Assess Bluetooth Low Energy device security by scanning, enumerating GATT services, and detecting vulnerabilities

mukul975
3

Performing Blind Ssrf Exploitation

v1.0.0

Detect and exploit blind Server-Side Request Forgery vulnerabilities using out-of-band techniques, DNS interactions, and timing analysis to access internal services and cloud metadata endpoints.

mukul975
5

Performing Binary Exploitation Analysis

v1.0.0

>

mukul975
4

Performing Bandwidth Throttling Attack Simulation

v1.0.0

>

mukul975
6

Performing Aws Privilege Escalation Assessment

v1.0.0

>

mukul975
6

Performing Aws Account Enumeration With Scout Suite

v1.0.0

Perform comprehensive security posture assessment of AWS accounts using ScoutSuite to enumerate resources, identify misconfigurations, and generate actionable security reports.

mukul975
4

Performing Automated Malware Analysis With Cape

v1.0.0

Deploy and operate CAPEv2 sandbox for automated malware analysis with behavioral monitoring, payload extraction, configuration parsing, and anti-evasion capabilities.

mukul975
4