Browse Skills

Hunting For Unusual Service Installations

v1.0.0

Detect suspicious Windows service installations (MITRE ATT&CK T1543.003) by parsing System event logs for Event ID 7045, analyzing service binary paths, and identifying indicators of persistence mechanisms.

mukul975
5

Hunting For Unusual Network Connections

v1.0.0

Hunt for unusual network connections by analyzing outbound traffic patterns, rare destinations, non-standard ports, and anomalous connection frequencies from endpoints.

mukul975
3

Hunting For T1098 Account Manipulation

v1.0.0

Hunt for MITRE ATT&CK T1098 account manipulation including shadow admin creation, SID history injection, group membership changes, and credential modifications using Windows Security Event Logs.

mukul975
3

Hunting For Suspicious Scheduled Tasks

v1.0.0

Hunt for adversary persistence and execution via Windows scheduled tasks by analyzing task creation events, suspicious task properties, and unusual execution patterns that indicate T1053.005 abuse.

mukul975
2

Hunting For Supply Chain Compromise

v1.0.0

Hunt for supply chain compromise indicators including trojanized software updates, compromised dependencies, unauthorized code modifications, and tampered build artifacts.

mukul975
3

Hunting For Startup Folder Persistence

v1.0.0

Detect T1547.001 startup folder persistence by monitoring Windows startup directories for suspicious file creation, analyzing autoruns entries, and using Python watchdog for real-time filesystem monitoring.

mukul975
2

Hunting For Spearphishing Indicators

v1.0.0

Hunt for spearphishing campaign indicators across email logs, endpoint telemetry, and network data to detect targeted email attacks.

mukul975
3

Hunting For Shadow Copy Deletion

v1.0.0

Hunt for Volume Shadow Copy deletion activity that indicates ransomware preparation or anti-forensics by monitoring vssadmin, wmic, and PowerShell shadow copy commands.

mukul975
3

Hunting For Scheduled Task Persistence

v1.0.0

Hunt for adversary persistence via Windows Scheduled Tasks by analyzing task creation events, suspicious task actions, and unusual scheduling patterns.

mukul975
2

Hunting For Registry Run Key Persistence

v1.0.0

Detect MITRE ATT&CK T1547.001 registry Run key persistence by analyzing Sysmon Event ID 13 logs and registry queries to identify malicious auto-start entries.

mukul975
4

Hunting For Registry Persistence Mechanisms

v1.0.0

Hunt for registry-based persistence mechanisms including Run keys, Winlogon modifications, IFEO injection, and COM hijacking in Windows environments.

mukul975
3

Hunting For Process Injection Techniques

v1.0.0

Detect process injection techniques (T1055) including CreateRemoteThread, process hollowing, and DLL injection via Sysmon Event IDs 8 and 10 and EDR process telemetry

mukul975
6