Browse Skills
Collecting Volatile Evidence From Compromised Host
v1.0.0Collect volatile forensic evidence from a compromised system following order of volatility, preserving memory, network connections, processes, and system state before they are lost.
Collecting Threat Intelligence With Misp
v1.0.0MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform for gathering, sharing, storing, and correlating Indicators of Compromise (IOCs) of targeted attacks, threat
Collecting Open Source Intelligence
v1.0.0>
Collecting Indicators Of Compromise
v1.0.0>
Bypassing Authentication With Forced Browsing
v1.0.0Discovering and accessing unprotected pages, APIs, and administrative interfaces by enumerating URLs and bypassing authentication controls during authorized security assessments.
Building Vulnerability Scanning Workflow
v1.0.0>
Building Vulnerability Exception Tracking System
v1.0.0Build a vulnerability exception and risk acceptance tracking system with approval workflows, compensating controls documentation, and expiration management.
Building Vulnerability Dashboard With Defectdojo
v1.0.0Deploy DefectDojo as a centralized vulnerability management dashboard with scanner integrations, deduplication, metrics tracking, and Jira ticketing workflows.
Building Vulnerability Aging And Sla Tracking
v1.0.0Implement a vulnerability aging dashboard and SLA tracking system to measure remediation performance against severity-based timelines and drive accountability.
Building Threat Intelligence Platform
v1.0.0Building a Threat Intelligence Platform (TIP) involves deploying and integrating multiple CTI tools into a unified system for collecting, analyzing, enriching, and disseminating threat intelligence. T
Building Threat Intelligence Feed Integration
v1.0.0>
Building Threat Intelligence Enrichment In Splunk
v1.0.0Build automated threat intelligence enrichment pipelines in Splunk Enterprise Security using lookup tables, modular inputs, and the Threat Intelligence Framework.