Browse Skills

Detecting Cloud Threats With Guardduty

v1.0.0

>

mukul975
5

Detecting Cloud Cryptomining Activity

v1.0.0

>

mukul975
3

Detecting Business Email Compromise With Ai

v1.0.0

Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing style, behavioral patterns, and contextual anomalies that evade traditional rule-based filters.

mukul975
3

Detecting Business Email Compromise

v1.0.0

Business Email Compromise (BEC) is a sophisticated fraud scheme where attackers impersonate executives, vendors, or trusted partners to trick employees into transferring funds, sharing sensitive data,

mukul975
2

Detecting Broken Object Property Level Authorization

v1.0.0

Detect and test for OWASP API3:2023 Broken Object Property Level Authorization vulnerabilities including excessive data exposure and mass assignment attacks.

mukul975
3

Detecting Beaconing Patterns With Zeek

v1.0.0

>

mukul975
4

Detecting Azure Storage Account Misconfigurations

v1.0.0

Audit Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing encryption at rest, disabled HTTPS-only traffic, and outdated TLS versions using the azure-mgmt-storage Python SDK.

mukul975
3

Detecting Azure Service Principal Abuse

v1.0.0

Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin consent bypass, and unauthorized enumeration in Microsoft Entra ID environments.

mukul975
3

Detecting Azure Lateral Movement

v1.0.0

Detect lateral movement in Azure AD/Entra ID environments using Microsoft Graph API audit logs, Azure Sentinel KQL hunting queries, and sign-in anomaly correlation to identify privilege escalation, token theft, and cross-tenant pivoting.

mukul975
5

Detecting Aws Iam Privilege Escalation

v1.0.0

Detect AWS IAM privilege escalation paths using boto3 and Cloudsplaining policy analysis to identify overly permissive policies, dangerous permission combinations, and least-privilege violations

mukul975
4

Detecting Aws Guardduty Findings Automation

v1.0.0

Automate AWS GuardDuty threat detection findings processing using EventBridge and Lambda to enable real-time incident response, automatic quarantine of compromised resources, and security notification workflows.

mukul975
3

Detecting Aws Credential Exposure With Trufflehog

v1.0.0

>

mukul975
4