Browse Skills

Analyzing Command And Control Communication

v1.0.0

>

mukul975
5

Analyzing Cobaltstrike Malleable C2 Profiles

v1.0.0

Parse and analyze Cobalt Strike Malleable C2 profiles using dissect.cobaltstrike and pyMalleableC2 to extract C2 indicators, detect evasion techniques, and generate network detection signatures.

mukul975
3

Analyzing Cobalt Strike Malleable Profiles

v1.0.0

>

mukul975
5

Analyzing Cobalt Strike Beacon Configuration

v1.0.0

Extract and analyze Cobalt Strike beacon configuration from PE files and memory dumps to identify C2 infrastructure, malleable profiles, and operator tradecraft.

mukul975
5

Analyzing Cloud Storage Access Patterns

v1.0.0

>-

mukul975
3

Analyzing Certificate Transparency For Phishing

v1.0.0

Monitor Certificate Transparency logs using crt.sh and Certstream to detect phishing domains, lookalike certificates, and unauthorized certificate issuance targeting your organization.

mukul975
5

Analyzing Campaign Attribution Evidence

v1.0.0

Campaign attribution analysis involves systematically evaluating evidence to determine which threat actor or group is responsible for a cyber operation. This skill covers collecting and weighting attr

mukul975
4

Analyzing Browser Forensics With Hindsight

v1.0.0

Analyze Chromium-based browser artifacts using Hindsight to extract browsing history, downloads, cookies, cached content, autofill data, saved passwords, and browser extensions from Chrome, Edge, Brave, and Opera for forensic investigation.

mukul975
4

Analyzing Bootkit And Rootkit Samples

v1.0.0

>

mukul975
2

Analyzing Azure Activity Logs For Threats

v1.0.0

>

mukul975
4

Analyzing Apt Group With Mitre Navigator

v1.0.0

Analyze advanced persistent threat (APT) group techniques using MITRE ATT&CK Navigator to create layered heatmaps of adversary TTPs for detection gap analysis and threat-informed defense.

mukul975
3

Analyzing Api Gateway Access Logs

v1.0.0

>

mukul975
3