Browse Skills
Detecting T1055 Process Injection With Sysmon
v1.0.0Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection by analyzing Sysmon events for cross-process memory operations, remote thread creation, and anomalous DLL loading patterns.
Detecting T1003 Credential Dumping With Edr
v1.0.0Detect OS credential dumping techniques targeting LSASS memory, SAM database, NTDS.dit, and cached credentials using EDR telemetry, Sysmon process access monitoring, and Windows security event correlation.
Detecting Suspicious Powershell Execution
v1.0.0Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts, and constrained language mode evasion.
Detecting Suspicious Oauth Application Consent
v1.0.0Detect risky OAuth application consent grants in Azure AD / Microsoft Entra ID using Microsoft Graph API, audit logs, and permission analysis to identify illicit consent grant attacks.
Detecting Supply Chain Attacks In Ci Cd
v1.0.0>
Detecting Stuxnet Style Attacks
v1.0.0>
Detecting Sql Injection Via Waf Logs
v1.0.0>-
Detecting Spearphishing With Email Gateway
v1.0.0Spearphishing targets specific individuals using personalized, researched content that bypasses generic spam filters. Email security gateways (SEGs) like Microsoft Defender for Office 365, Proofpoint,
Detecting Shadow It Cloud Usage
v1.0.0Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow data using Python pandas for traffic pattern analysis and domain classification.
Detecting Shadow Api Endpoints
v1.0.0Discover and inventory shadow API endpoints that operate outside documented specifications using traffic analysis, code scanning, and API discovery platforms.
Detecting Service Account Abuse
v1.0.0Detect abuse of service accounts through anomalous interactive logons, privilege escalation, lateral movement, and unauthorized access patterns.
Detecting S3 Data Exfiltration Attempts
v1.0.0>