Browse Skills

Collecting Volatile Evidence From Compromised Host

v1.0.0

Collect volatile forensic evidence from a compromised system following order of volatility, preserving memory, network connections, processes, and system state before they are lost.

mukul975
5

Collecting Threat Intelligence With Misp

v1.0.0

MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform for gathering, sharing, storing, and correlating Indicators of Compromise (IOCs) of targeted attacks, threat

mukul975
3

Collecting Open Source Intelligence

v1.0.0

>

mukul975
3

Collecting Indicators Of Compromise

v1.0.0

>

mukul975
3

Bypassing Authentication With Forced Browsing

v1.0.0

Discovering and accessing unprotected pages, APIs, and administrative interfaces by enumerating URLs and bypassing authentication controls during authorized security assessments.

mukul975
3

Building Vulnerability Scanning Workflow

v1.0.0

>

mukul975
2

Building Vulnerability Exception Tracking System

v1.0.0

Build a vulnerability exception and risk acceptance tracking system with approval workflows, compensating controls documentation, and expiration management.

mukul975
5

Building Vulnerability Dashboard With Defectdojo

v1.0.0

Deploy DefectDojo as a centralized vulnerability management dashboard with scanner integrations, deduplication, metrics tracking, and Jira ticketing workflows.

mukul975
3

Building Vulnerability Aging And Sla Tracking

v1.0.0

Implement a vulnerability aging dashboard and SLA tracking system to measure remediation performance against severity-based timelines and drive accountability.

mukul975
5

Building Threat Intelligence Platform

v1.0.0

Building a Threat Intelligence Platform (TIP) involves deploying and integrating multiple CTI tools into a unified system for collecting, analyzing, enriching, and disseminating threat intelligence. T

mukul975
3

Building Threat Intelligence Feed Integration

v1.0.0

>

mukul975
2

Building Threat Intelligence Enrichment In Splunk

v1.0.0

Build automated threat intelligence enrichment pipelines in Splunk Enterprise Security using lookup tables, modular inputs, and the Threat Intelligence Framework.

mukul975
6