Browse Skills
Building Threat Hunt Hypothesis Framework
v1.0.0Build a systematic threat hunt hypothesis framework that transforms threat intelligence, attack patterns, and environmental data into testable hunting hypotheses.
Building Threat Feed Aggregation With Misp
v1.0.0Deploy MISP (Malware Information Sharing Platform) to aggregate, correlate, and distribute threat intelligence feeds from multiple sources for centralized IOC management and automated SIEM integration.
Building Threat Actor Profile From Osint
v1.0.0Build comprehensive threat actor profiles using open-source intelligence (OSINT) techniques to document adversary motivations, capabilities, infrastructure, and TTPs for proactive defense.
Building Soc Playbook For Ransomware
v1.0.0>
Building Soc Metrics And Kpi Tracking
v1.0.0>
Building Soc Escalation Matrix
v1.0.0Build a structured SOC escalation matrix defining severity tiers, response SLAs, escalation paths, and notification procedures for security incidents.
Building Role Mining For Rbac Optimization
v1.0.0Apply bottom-up and top-down role mining techniques to discover optimal RBAC roles from existing user-permission assignments, reducing role explosion and enforcing least privilege.
Building Red Team C2 Infrastructure With Havoc
v1.0.0Deploy and configure the Havoc C2 framework with teamserver, HTTPS listeners, redirectors, and Demon agents for authorized red team operations.
Building Phishing Reporting Button Workflow
v1.0.0Implement a phishing report button in email clients with automated triage workflow that analyzes user-reported suspicious emails and provides feedback to reporters.
Building Patch Tuesday Response Process
v1.0.0Establish a structured operational process to triage, test, and deploy Microsoft Patch Tuesday security updates within risk-based remediation SLAs.
Building Malware Incident Communication Template
v1.0.0Build structured communication templates for malware incidents including stakeholder notifications, executive briefings, technical advisories, and regulatory disclosures with severity-based escalation procedures.
Building Ioc Enrichment Pipeline With Opencti
v1.0.0OpenCTI is an open-source platform for managing cyber threat intelligence knowledge, built on STIX 2.1 as its native data model. This skill covers building an automated IOC enrichment pipeline using O