Browse Skills

Analyzing Linux Audit Logs For Intrusion

v1.0.0

>

mukul975
5

Analyzing Kubernetes Audit Logs

v1.0.0

>

mukul975
3

Analyzing Ios App Security With Objection

v1.0.0

>

mukul975
5

Analyzing Indicators Of Compromise

v1.0.0

>

mukul975
3

Analyzing Heap Spray Exploitation

v1.0.0

Detect and analyze heap spray attacks in memory dumps using Volatility3 plugins to identify NOP sled patterns, shellcode landing zones, and suspicious large allocations in process virtual address space.

mukul975
3

Analyzing Golang Malware With Ghidra

v1.0.0

Reverse engineer Go-compiled malware using Ghidra with specialized scripts for function recovery, string extraction, and type reconstruction in stripped Go binaries.

mukul975
4

Analyzing Ethereum Smart Contract Vulnerabilities

v1.0.0

Perform static and symbolic analysis of Solidity smart contracts using Slither and Mythril to detect reentrancy, integer overflow, access control, and other vulnerability classes before deployment to Ethereum mainnet.

mukul975
5

Analyzing Email Headers For Phishing Investigation

v1.0.0

Parse and analyze email headers to trace the origin of phishing emails, verify sender authenticity, and identify spoofing through SPF, DKIM, and DMARC validation.

mukul975
3

Analyzing Docker Container Forensics

v1.0.0

Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to identify malicious activity and evidence.

mukul975
5

Analyzing Dns Logs For Exfiltration

v1.0.0

>

mukul975
3

Analyzing Disk Image With Autopsy

v1.0.0

Perform comprehensive forensic analysis of disk images using Autopsy to recover files, examine artifacts, and build investigation timelines.

mukul975
3

Analyzing Cyber Kill Chain

v1.0.0

>

mukul975
4