Browse Skills
Analyzing Linux Audit Logs For Intrusion
v1.0.0>
Analyzing Kubernetes Audit Logs
v1.0.0>
Analyzing Ios App Security With Objection
v1.0.0>
Analyzing Indicators Of Compromise
v1.0.0>
Analyzing Heap Spray Exploitation
v1.0.0Detect and analyze heap spray attacks in memory dumps using Volatility3 plugins to identify NOP sled patterns, shellcode landing zones, and suspicious large allocations in process virtual address space.
Analyzing Golang Malware With Ghidra
v1.0.0Reverse engineer Go-compiled malware using Ghidra with specialized scripts for function recovery, string extraction, and type reconstruction in stripped Go binaries.
Analyzing Ethereum Smart Contract Vulnerabilities
v1.0.0Perform static and symbolic analysis of Solidity smart contracts using Slither and Mythril to detect reentrancy, integer overflow, access control, and other vulnerability classes before deployment to Ethereum mainnet.
Analyzing Email Headers For Phishing Investigation
v1.0.0Parse and analyze email headers to trace the origin of phishing emails, verify sender authenticity, and identify spoofing through SPF, DKIM, and DMARC validation.
Analyzing Docker Container Forensics
v1.0.0Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to identify malicious activity and evidence.
Analyzing Dns Logs For Exfiltration
v1.0.0>
Analyzing Disk Image With Autopsy
v1.0.0Perform comprehensive forensic analysis of disk images using Autopsy to recover files, examine artifacts, and build investigation timelines.
Analyzing Cyber Kill Chain
v1.0.0>