Browse Skills

Building Threat Hunt Hypothesis Framework

v1.0.0

Build a systematic threat hunt hypothesis framework that transforms threat intelligence, attack patterns, and environmental data into testable hunting hypotheses.

mukul975
4

Building Threat Feed Aggregation With Misp

v1.0.0

Deploy MISP (Malware Information Sharing Platform) to aggregate, correlate, and distribute threat intelligence feeds from multiple sources for centralized IOC management and automated SIEM integration.

mukul975
2

Building Threat Actor Profile From Osint

v1.0.0

Build comprehensive threat actor profiles using open-source intelligence (OSINT) techniques to document adversary motivations, capabilities, infrastructure, and TTPs for proactive defense.

mukul975
5

Building Soc Playbook For Ransomware

v1.0.0

>

mukul975
2

Building Soc Metrics And Kpi Tracking

v1.0.0

>

mukul975
2

Building Soc Escalation Matrix

v1.0.0

Build a structured SOC escalation matrix defining severity tiers, response SLAs, escalation paths, and notification procedures for security incidents.

mukul975
3

Building Role Mining For Rbac Optimization

v1.0.0

Apply bottom-up and top-down role mining techniques to discover optimal RBAC roles from existing user-permission assignments, reducing role explosion and enforcing least privilege.

mukul975
5

Building Red Team C2 Infrastructure With Havoc

v1.0.0

Deploy and configure the Havoc C2 framework with teamserver, HTTPS listeners, redirectors, and Demon agents for authorized red team operations.

mukul975
3

Building Phishing Reporting Button Workflow

v1.0.0

Implement a phishing report button in email clients with automated triage workflow that analyzes user-reported suspicious emails and provides feedback to reporters.

mukul975
3

Building Patch Tuesday Response Process

v1.0.0

Establish a structured operational process to triage, test, and deploy Microsoft Patch Tuesday security updates within risk-based remediation SLAs.

mukul975
4

Building Malware Incident Communication Template

v1.0.0

Build structured communication templates for malware incidents including stakeholder notifications, executive briefings, technical advisories, and regulatory disclosures with severity-based escalation procedures.

mukul975
3

Building Ioc Enrichment Pipeline With Opencti

v1.0.0

OpenCTI is an open-source platform for managing cyber threat intelligence knowledge, built on STIX 2.1 as its native data model. This skill covers building an automated IOC enrichment pipeline using O

mukul975
2