Browse Skills

Analyzing Memory Dumps With Volatility

v1.0.0

>

mukul975
3

Analyzing Malware Sandbox Evasion Techniques

v1.0.0

Detect sandbox evasion techniques in malware samples by analyzing timing checks, VM artifact queries, user interaction detection, and sleep inflation patterns from Cuckoo/AnyRun behavioral reports

mukul975
5

Analyzing Malware Persistence With Autoruns

v1.0.0

Use Sysinternals Autoruns to systematically identify and analyze malware persistence mechanisms across registry keys, scheduled tasks, services, drivers, and startup locations on Windows systems.

mukul975
4

Analyzing Malware Family Relationships With Malpedia

v1.0.0

Use the Malpedia platform and API to research malware family relationships, track variant evolution, link families to threat actors, and integrate YARA rules for detection across malware lineages.

mukul975
2

Analyzing Malware Behavior With Cuckoo Sandbox

v1.0.0

>

mukul975
3

Analyzing Malicious Url With Urlscan

v1.0.0

URLScan.io is a free service for scanning and analyzing suspicious URLs. It captures screenshots, DOM content, HTTP transactions, JavaScript behavior, and network connections of web pages in an isolat

mukul975
6

Analyzing Malicious Pdf With Peepdf

v1.0.0

Perform static analysis of malicious PDF documents using peepdf, pdfid, and pdf-parser to extract embedded JavaScript, shellcode, and suspicious objects.

mukul975
4

Analyzing Macro Malware In Office Documents

v1.0.0

>

mukul975
4

Analyzing Lnk File And Jump List Artifacts

v1.0.0

Analyze Windows LNK shortcut files and Jump List artifacts to establish evidence of file access, program execution, and user activity using LECmd, JLECmd, and manual binary parsing of the Shell Link Binary format.

mukul975
5

Analyzing Linux System Artifacts

v1.0.0

Examine Linux system artifacts including auth logs, cron jobs, shell history, and system configuration to uncover evidence of compromise or unauthorized activity.

mukul975
3

Analyzing Linux Kernel Rootkits

v1.0.0

Detect kernel-level rootkits in Linux memory dumps using Volatility3 linux plugins (check_syscall, lsmod, hidden_modules), rkhunter system scanning, and /proc vs /sys discrepancy analysis to identify hooked syscalls, hidden kernel modules, and tampered system structures.

mukul975
2

Analyzing Linux Elf Malware

v1.0.0

>

mukul975
4