Browse Skills
Analyzing Memory Dumps With Volatility
v1.0.0>
Analyzing Malware Sandbox Evasion Techniques
v1.0.0Detect sandbox evasion techniques in malware samples by analyzing timing checks, VM artifact queries, user interaction detection, and sleep inflation patterns from Cuckoo/AnyRun behavioral reports
Analyzing Malware Persistence With Autoruns
v1.0.0Use Sysinternals Autoruns to systematically identify and analyze malware persistence mechanisms across registry keys, scheduled tasks, services, drivers, and startup locations on Windows systems.
Analyzing Malware Family Relationships With Malpedia
v1.0.0Use the Malpedia platform and API to research malware family relationships, track variant evolution, link families to threat actors, and integrate YARA rules for detection across malware lineages.
Analyzing Malware Behavior With Cuckoo Sandbox
v1.0.0>
Analyzing Malicious Url With Urlscan
v1.0.0URLScan.io is a free service for scanning and analyzing suspicious URLs. It captures screenshots, DOM content, HTTP transactions, JavaScript behavior, and network connections of web pages in an isolat
Analyzing Malicious Pdf With Peepdf
v1.0.0Perform static analysis of malicious PDF documents using peepdf, pdfid, and pdf-parser to extract embedded JavaScript, shellcode, and suspicious objects.
Analyzing Macro Malware In Office Documents
v1.0.0>
Analyzing Lnk File And Jump List Artifacts
v1.0.0Analyze Windows LNK shortcut files and Jump List artifacts to establish evidence of file access, program execution, and user activity using LECmd, JLECmd, and manual binary parsing of the Shell Link Binary format.
Analyzing Linux System Artifacts
v1.0.0Examine Linux system artifacts including auth logs, cron jobs, shell history, and system configuration to uncover evidence of compromise or unauthorized activity.
Analyzing Linux Kernel Rootkits
v1.0.0Detect kernel-level rootkits in Linux memory dumps using Volatility3 linux plugins (check_syscall, lsmod, hidden_modules), rkhunter system scanning, and /proc vs /sys discrepancy analysis to identify hooked syscalls, hidden kernel modules, and tampered system structures.
Analyzing Linux Elf Malware
v1.0.0>