Browse Skills
Building Automated Malware Submission Pipeline
v1.0.0>
Building Attack Pattern Library From Cti Reports
v1.0.0Extract and catalog attack patterns from cyber threat intelligence reports into a structured STIX-based library mapped to MITRE ATT&CK for detection engineering and threat-informed defense.
Building Adversary Infrastructure Tracking System
v1.0.0Build an automated system to track adversary infrastructure using passive DNS, certificate transparency, WHOIS data, and IP enrichment to map and monitor threat actor command-and-control networks.
Automating Ioc Enrichment
v1.0.0>
Auditing Terraform Infrastructure For Security
v1.0.0>
Auditing Kubernetes Rbac Permissions
v1.0.0Kubernetes Role-Based Access Control (RBAC) auditing systematically reviews roles, cluster roles, bindings, and service account permissions to identify overly permissive access, privilege escalation p
Auditing Kubernetes Cluster Rbac
v1.0.0>
Auditing Gcp Iam Permissions
v1.0.0>
Auditing Cloud With Cis Benchmarks
v1.0.0>
Auditing Azure Active Directory Configuration
v1.0.0>
Auditing Aws S3 Bucket Permissions
v1.0.0>
Analyzing Windows Shellbag Artifacts
v1.0.0Analyze Windows Shellbag registry artifacts to reconstruct folder browsing activity, detect access to removable media and network shares, and establish user interaction with directories even after deletion using SBECmd and ShellBags Explorer.