Browse Skills

Detecting T1055 Process Injection With Sysmon

v1.0.0

Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection by analyzing Sysmon events for cross-process memory operations, remote thread creation, and anomalous DLL loading patterns.

mukul975
2

Detecting T1003 Credential Dumping With Edr

v1.0.0

Detect OS credential dumping techniques targeting LSASS memory, SAM database, NTDS.dit, and cached credentials using EDR telemetry, Sysmon process access monitoring, and Windows security event correlation.

mukul975
2

Detecting Suspicious Powershell Execution

v1.0.0

Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts, and constrained language mode evasion.

mukul975
4

Detecting Suspicious Oauth Application Consent

v1.0.0

Detect risky OAuth application consent grants in Azure AD / Microsoft Entra ID using Microsoft Graph API, audit logs, and permission analysis to identify illicit consent grant attacks.

mukul975
6

Detecting Supply Chain Attacks In Ci Cd

v1.0.0

>

mukul975
2

Detecting Stuxnet Style Attacks

v1.0.0

>

mukul975
3

Detecting Sql Injection Via Waf Logs

v1.0.0

>-

mukul975
3

Detecting Spearphishing With Email Gateway

v1.0.0

Spearphishing targets specific individuals using personalized, researched content that bypasses generic spam filters. Email security gateways (SEGs) like Microsoft Defender for Office 365, Proofpoint,

mukul975
3

Detecting Shadow It Cloud Usage

v1.0.0

Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow data using Python pandas for traffic pattern analysis and domain classification.

mukul975
3

Detecting Shadow Api Endpoints

v1.0.0

Discover and inventory shadow API endpoints that operate outside documented specifications using traffic analysis, code scanning, and API discovery platforms.

mukul975
5

Detecting Service Account Abuse

v1.0.0

Detect abuse of service accounts through anomalous interactive logons, privilege escalation, lateral movement, and unauthorized access patterns.

mukul975
3

Detecting S3 Data Exfiltration Attempts

v1.0.0

>

mukul975
4