Browse Skills

Exploiting Api Injection Vulnerabilities

v1.0.0

>

mukul975
3

Exploiting Active Directory With Bloodhound

v1.0.0

BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attac

mukul975
3

Exploiting Active Directory Certificate Services Esc1

v1.0.0

Exploit misconfigured Active Directory Certificate Services (AD CS) ESC1 vulnerability to request certificates as high-privileged users and escalate domain privileges during authorized red team assessments.

mukul975
3

Executing Red Team Exercise

v1.0.0

>

mukul975
3

Executing Red Team Engagement Planning

v1.0.0

Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins.

mukul975
3

Executing Phishing Simulation Campaign

v1.0.0

>

mukul975
3

Executing Diamond Model Analysis

v1.0.0

>

mukul975
3

Executing Active Directory Attack Simulation

v1.0.0

>

mukul975
6

Evaluating Threat Intelligence Platforms

v1.0.0

>

mukul975
3

Eradicating Malware From Infected Systems

v1.0.0

Systematically remove malware, backdoors, and attacker persistence mechanisms from infected systems while ensuring complete eradication and preventing re-infection.

mukul975
5

Detecting Wmi Persistence

v1.0.0

Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter, EventConsumer, and FilterToConsumerBinding creation.

mukul975
3

Detecting T1548 Abuse Elevation Control Mechanism

v1.0.0

Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation by monitoring registry modifications, process elevation flags, and unusual parent-child process relationships.

mukul975
2