Browse Skills
Analyzing Command And Control Communication
v1.0.0>
Analyzing Cobaltstrike Malleable C2 Profiles
v1.0.0Parse and analyze Cobalt Strike Malleable C2 profiles using dissect.cobaltstrike and pyMalleableC2 to extract C2 indicators, detect evasion techniques, and generate network detection signatures.
Analyzing Cobalt Strike Malleable Profiles
v1.0.0>
Analyzing Cobalt Strike Beacon Configuration
v1.0.0Extract and analyze Cobalt Strike beacon configuration from PE files and memory dumps to identify C2 infrastructure, malleable profiles, and operator tradecraft.
Analyzing Cloud Storage Access Patterns
v1.0.0>-
Analyzing Certificate Transparency For Phishing
v1.0.0Monitor Certificate Transparency logs using crt.sh and Certstream to detect phishing domains, lookalike certificates, and unauthorized certificate issuance targeting your organization.
Analyzing Campaign Attribution Evidence
v1.0.0Campaign attribution analysis involves systematically evaluating evidence to determine which threat actor or group is responsible for a cyber operation. This skill covers collecting and weighting attr
Analyzing Browser Forensics With Hindsight
v1.0.0Analyze Chromium-based browser artifacts using Hindsight to extract browsing history, downloads, cookies, cached content, autofill data, saved passwords, and browser extensions from Chrome, Edge, Brave, and Opera for forensic investigation.
Analyzing Bootkit And Rootkit Samples
v1.0.0>
Analyzing Azure Activity Logs For Threats
v1.0.0>
Analyzing Apt Group With Mitre Navigator
v1.0.0Analyze advanced persistent threat (APT) group techniques using MITRE ATT&CK Navigator to create layered heatmaps of adversary TTPs for detection gap analysis and threat-informed defense.
Analyzing Api Gateway Access Logs
v1.0.0>