Browse Skills
Analyzing Pdf Malware With Pdfid
v1.0.0>
Analyzing Packed Malware With Upx Unpacker
v1.0.0>
Analyzing Outlook Pst For Email Forensics
v1.0.0Analyze Microsoft Outlook PST and OST files for email forensic evidence including message content, headers, attachments, deleted items, and metadata using libpff, pst-utils, and forensic email analysis tools for legal investigations and incident response.
Analyzing Office365 Audit Logs For Compromise
v1.0.0Parse Office 365 Unified Audit Logs via Microsoft Graph API to detect email forwarding rule creation, inbox delegation, suspicious OAuth app grants, and other indicators of account compromise.
Analyzing Network Traffic With Wireshark
v1.0.0>
Analyzing Network Traffic Of Malware
v1.0.0>
Analyzing Network Traffic For Incidents
v1.0.0>
Analyzing Network Packets With Scapy
v1.0.0Craft, send, sniff, and dissect network packets using Scapy for protocol analysis, network reconnaissance, and traffic anomaly detection in authorized security testing
Analyzing Network Flow Data With Netflow
v1.0.0>-
Analyzing Network Covert Channels In Malware
v1.0.0Detect and analyze covert communication channels used by malware including DNS tunneling, ICMP exfiltration, steganographic HTTP, and protocol abuse for C2 and data exfiltration.
Analyzing Mft For Deleted File Recovery
v1.0.0Analyze the NTFS Master File Table ($MFT) to recover metadata and content of deleted files by examining MFT record entries, $LogFile, $UsnJrnl, and MFT slack space using MFTECmd, analyzeMFT, and X-Ways Forensics.
Analyzing Memory Forensics With Lime And Volatility
v1.0.0>