Browse Skills
Analyzing Windows Registry For Artifacts
v1.0.0Extract and analyze Windows Registry hives to uncover user activity, installed software, autostart entries, and evidence of system compromise.
Analyzing Windows Prefetch With Python
v1.0.0Parse Windows Prefetch files using the windowsprefetch Python library to reconstruct application execution history, detect renamed or masquerading binaries, and identify suspicious program execution patterns.
Analyzing Windows Lnk Files For Artifacts
v1.0.0Parse Windows LNK shortcut files to extract target paths, timestamps, volume information, and machine identifiers for forensic timeline reconstruction.
Analyzing Windows Event Logs In Splunk
v1.0.0>
Analyzing Windows Amcache Artifacts
v1.0.0>
Analyzing Web Server Logs For Intrusion
v1.0.0>-
Analyzing Usb Device Connection History
v1.0.0Investigate USB device connection history from Windows registry, event logs, and setupapi logs to track removable media usage and potential data exfiltration.
Analyzing Typosquatting Domains With Dnstwist
v1.0.0Detect typosquatting, homograph phishing, and brand impersonation domains using dnstwist to generate domain permutations and identify registered lookalike domains targeting your organization.
Analyzing Tls Certificate Transparency Logs
v1.0.0>
Analyzing Threat Landscape With Misp
v1.0.0>-
Analyzing Threat Intelligence Feeds
v1.0.0>
Analyzing Threat Actor Ttps With Mitre Navigator
v1.0.0>