Browse Skills

Hunting For Data Staging Before Exfiltration

v1.0.0

Detect data staging activity before exfiltration by monitoring for archive creation with 7-Zip/RAR, unusual temp folder access, large file consolidation, and staging directory patterns via EDR and process telemetry

mukul975
3

Hunting For Data Exfiltration Indicators

v1.0.0

Hunt for data exfiltration through network traffic analysis, detecting unusual data flows, DNS tunneling, cloud storage uploads, and encrypted channel abuse.

mukul975
6

Hunting For Command And Control Beaconing

v1.0.0

Detect C2 beaconing patterns in network traffic using frequency analysis, jitter detection, and domain reputation to identify compromised endpoints communicating with adversary infrastructure.

mukul975
2

Hunting For Cobalt Strike Beacons

v1.0.0

Detect Cobalt Strike beacon network activity using default TLS certificate signatures (serial 8BB00EE), JA3/JA3S/JARM fingerprints, HTTP C2 profile pattern matching, beacon jitter analysis, and named pipe detection via Zeek, Suricata, and Python PCAP analysis.

mukul975
3

Hunting For Beaconing With Frequency Analysis

v1.0.0

Identify command-and-control beaconing patterns in network traffic by applying statistical frequency analysis, jitter calculation, and coefficient of variation scoring to detect periodic callbacks from compromised endpoints.

mukul975
4

Hunting For Anomalous Powershell Execution

v1.0.0

>

mukul975
2

Hunting Credential Stuffing Attacks

v1.0.0

>

mukul975
3

Hunting Advanced Persistent Threats

v1.0.0

>

mukul975
3

Hardening Windows Endpoint With Cis Benchmark

v1.0.0

>

mukul975
3

Hardening Linux Endpoint With Cis Benchmark

v1.0.0

>

mukul975
3

Hardening Docker Daemon Configuration

v1.0.0

Harden the Docker daemon by configuring daemon.json with user namespace remapping, TLS authentication, rootless mode, and CIS benchmark controls.

mukul975
5

Hardening Docker Containers For Production

v1.0.0

Hardening Docker containers for production involves applying security best practices aligned with CIS Docker Benchmark v1.8.0 to minimize attack surface, prevent privilege escalation, and enforce leas

mukul975
3