Browse Skills

Analyzing Threat Actor Ttps With Mitre Attack

v1.0.0

MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations. This skill covers systematically mapping threat actor beh

mukul975
3

Analyzing Supply Chain Malware Artifacts

v1.0.0

Investigate supply chain attack artifacts including trojanized software updates, compromised build pipelines, and sideloaded dependencies to identify intrusion vectors and scope of compromise.

mukul975
3

Analyzing Slack Space And File System Artifacts

v1.0.0

Examine file system slack space, MFT entries, USN journal, and alternate data streams to recover hidden data and reconstruct file activity on NTFS volumes.

mukul975
4

Analyzing Security Logs With Splunk

v1.0.0

>

mukul975
4

Analyzing Ransomware Network Indicators

v1.0.0

Identify ransomware network indicators including C2 beaconing patterns, TOR exit node connections, data exfiltration flows, and encryption key exchange via Zeek conn.log and NetFlow analysis

mukul975
3

Analyzing Ransomware Leak Site Intelligence

v1.0.0

Monitor and analyze ransomware group data leak sites (DLS) to track victim postings, extract threat intelligence on group tactics, and assess sector-specific ransomware risk for proactive defense.

mukul975
5

Analyzing Ransomware Encryption Mechanisms

v1.0.0

>

mukul975
3

Analyzing Prefetch Files For Execution History

v1.0.0

Parse Windows Prefetch files to determine program execution history including run counts, timestamps, and referenced files for forensic investigation.

mukul975
4

Analyzing Powershell Script Block Logging

v1.0.0

>-

mukul975
3

Analyzing Powershell Empire Artifacts

v1.0.0

Detect PowerShell Empire framework artifacts in Windows event logs by identifying Base64 encoded launcher patterns, default user agents, staging URL structures, stager IOCs, and known Empire module signatures in Script Block Logging events.

mukul975
4

Analyzing Phishing Email Headers

v1.0.0

Email headers contain critical metadata that reveals the true origin, routing path, and authentication status of emails. Analyzing these headers is a foundational skill for identifying phishing attemp

mukul975
2

Analyzing Persistence Mechanisms In Linux

v1.0.0

Detect and analyze Linux persistence mechanisms including crontab entries, systemd service units, LD_PRELOAD hijacking, bashrc modifications, and authorized_keys backdoors using auditd and file integrity monitoring

mukul975
5