Browse Skills

Analyzing Windows Registry For Artifacts

v1.0.0

Extract and analyze Windows Registry hives to uncover user activity, installed software, autostart entries, and evidence of system compromise.

mukul975
5

Analyzing Windows Prefetch With Python

v1.0.0

Parse Windows Prefetch files using the windowsprefetch Python library to reconstruct application execution history, detect renamed or masquerading binaries, and identify suspicious program execution patterns.

mukul975
3

Analyzing Windows Lnk Files For Artifacts

v1.0.0

Parse Windows LNK shortcut files to extract target paths, timestamps, volume information, and machine identifiers for forensic timeline reconstruction.

mukul975
5

Analyzing Windows Event Logs In Splunk

v1.0.0

>

mukul975
3

Analyzing Windows Amcache Artifacts

v1.0.0

>

mukul975
3

Analyzing Web Server Logs For Intrusion

v1.0.0

>-

mukul975
3

Analyzing Usb Device Connection History

v1.0.0

Investigate USB device connection history from Windows registry, event logs, and setupapi logs to track removable media usage and potential data exfiltration.

mukul975
3

Analyzing Typosquatting Domains With Dnstwist

v1.0.0

Detect typosquatting, homograph phishing, and brand impersonation domains using dnstwist to generate domain permutations and identify registered lookalike domains targeting your organization.

mukul975
2

Analyzing Tls Certificate Transparency Logs

v1.0.0

>

mukul975
4

Analyzing Threat Landscape With Misp

v1.0.0

>-

mukul975
3

Analyzing Threat Intelligence Feeds

v1.0.0

>

mukul975
3

Analyzing Threat Actor Ttps With Mitre Navigator

v1.0.0

>

mukul975
4