Browse Skills
Detecting Aws Cloudtrail Anomalies
v1.0.0Detect unusual API call patterns in AWS CloudTrail logs using boto3, statistical baselining, and behavioral analysis to identify credential compromise, privilege escalation, and unauthorized resource access.
Detecting Attacks On Scada Systems
v1.0.0>
Detecting Attacks On Historian Servers
v1.0.0>
Detecting Arp Poisoning In Network Traffic
v1.0.0Detect and prevent ARP spoofing attacks using ARPWatch, Dynamic ARP Inspection, Wireshark analysis, and custom monitoring scripts to protect against man-in-the-middle interception.
Detecting Api Enumeration Attacks
v1.0.0Detect and prevent API enumeration attacks including BOLA and IDOR exploitation by monitoring sequential identifier access patterns and authorization failures.
Detecting Anomalous Authentication Patterns
v1.0.0>
Detecting Anomalies In Industrial Control Systems
v1.0.0>
Deploying Tailscale For Zero Trust Vpn
v1.0.0Deploy and configure Tailscale as a WireGuard-based zero trust mesh VPN with identity-aware access controls, ACLs, and exit nodes for secure peer-to-peer connectivity.
Deploying Software Defined Perimeter
v1.0.0Deploying Software Defined Perimeter
Deploying Ransomware Canary Files
v1.0.0>
Deploying Palo Alto Prisma Access Zero Trust
v1.0.0>
Deploying Osquery For Endpoint Monitoring
v1.0.0>