Browse Skills

Building Automated Malware Submission Pipeline

v1.0.0

>

mukul975
2

Building Attack Pattern Library From Cti Reports

v1.0.0

Extract and catalog attack patterns from cyber threat intelligence reports into a structured STIX-based library mapped to MITRE ATT&CK for detection engineering and threat-informed defense.

mukul975
3

Building Adversary Infrastructure Tracking System

v1.0.0

Build an automated system to track adversary infrastructure using passive DNS, certificate transparency, WHOIS data, and IP enrichment to map and monitor threat actor command-and-control networks.

mukul975
4

Automating Ioc Enrichment

v1.0.0

>

mukul975
3

Auditing Terraform Infrastructure For Security

v1.0.0

>

mukul975
3

Auditing Kubernetes Rbac Permissions

v1.0.0

Kubernetes Role-Based Access Control (RBAC) auditing systematically reviews roles, cluster roles, bindings, and service account permissions to identify overly permissive access, privilege escalation p

mukul975
2

Auditing Kubernetes Cluster Rbac

v1.0.0

>

mukul975
2

Auditing Gcp Iam Permissions

v1.0.0

>

mukul975
5

Auditing Cloud With Cis Benchmarks

v1.0.0

>

mukul975
5

Auditing Azure Active Directory Configuration

v1.0.0

>

mukul975
3

Auditing Aws S3 Bucket Permissions

v1.0.0

>

mukul975
3

Analyzing Windows Shellbag Artifacts

v1.0.0

Analyze Windows Shellbag registry artifacts to reconstruct folder browsing activity, detect access to removable media and network shares, and establish user interaction with directories even after deletion using SBECmd and ShellBags Explorer.

mukul975
4