Browse Skills
Detecting Cloud Threats With Guardduty
v1.0.0>
Detecting Cloud Cryptomining Activity
v1.0.0>
Detecting Business Email Compromise With Ai
v1.0.0Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing style, behavioral patterns, and contextual anomalies that evade traditional rule-based filters.
Detecting Business Email Compromise
v1.0.0Business Email Compromise (BEC) is a sophisticated fraud scheme where attackers impersonate executives, vendors, or trusted partners to trick employees into transferring funds, sharing sensitive data,
Detecting Broken Object Property Level Authorization
v1.0.0Detect and test for OWASP API3:2023 Broken Object Property Level Authorization vulnerabilities including excessive data exposure and mass assignment attacks.
Detecting Beaconing Patterns With Zeek
v1.0.0>
Detecting Azure Storage Account Misconfigurations
v1.0.0Audit Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing encryption at rest, disabled HTTPS-only traffic, and outdated TLS versions using the azure-mgmt-storage Python SDK.
Detecting Azure Service Principal Abuse
v1.0.0Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin consent bypass, and unauthorized enumeration in Microsoft Entra ID environments.
Detecting Azure Lateral Movement
v1.0.0Detect lateral movement in Azure AD/Entra ID environments using Microsoft Graph API audit logs, Azure Sentinel KQL hunting queries, and sign-in anomaly correlation to identify privilege escalation, token theft, and cross-tenant pivoting.
Detecting Aws Iam Privilege Escalation
v1.0.0Detect AWS IAM privilege escalation paths using boto3 and Cloudsplaining policy analysis to identify overly permissive policies, dangerous permission combinations, and least-privilege violations
Detecting Aws Guardduty Findings Automation
v1.0.0Automate AWS GuardDuty threat detection findings processing using EventBridge and Lambda to enable real-time incident response, automatic quarantine of compromised resources, and security notification workflows.
Detecting Aws Credential Exposure With Trufflehog
v1.0.0>