Found 699 skills for "mukul975" Page 1 of 59

tracking-threat-actor-infrastructure

Threat actor infrastructure tracking involves monitoring and mapping adversary-controlled assets including command-and-control (C2) servers, phishing ...

github 8 files

validating-backup-integrity-for-recovery

Use this skill when: Verifying backup integrity before relying on backups for ransomware recovery Building automated backup validation pipelines that ...

github 4 files

testing-for-broken-access-control

During authorized penetration tests as the primary assessment for OWASP A01:2021 - Broken Access Control When evaluating role-based access control (RB...

github 4 files

testing-for-open-redirect-vulnerabilities

When testing login/logout flows that redirect users to specified URLs During assessment of OAuth authorization endpoints with redirecturi parameters W...

github 4 files

testing-ransomware-recovery-procedures

Use this skill when: Validating that ransomware recovery plans actually work under realistic conditions Measuring RTO (Recovery Time Objective) and RP...

github 4 files

reverse-engineering-android-malware-with-jadx

A suspicious Android APK has been reported as malicious or flagged by mobile threat detection Analyzing Android banking trojans, spyware, SMS stealers...

github 4 files

reverse-engineering-ransomware-encryption-routine

Modern ransomware uses hybrid encryption combining symmetric algorithms (AES-256-CBC/CTR, ChaCha20, Salsa20) for file encryption with asymmetric algor...

github 8 files

securing-container-registry-with-harbor

Harbor is an open-source container registry that provides security features including vulnerability scanning (integrated Trivy), image signing (Notary...

github 8 files

performing-user-behavior-analytics

Use this skill when: SOC teams need to detect compromised accounts through abnormal authentication patterns Insider threat programs require behavioral...

github 4 files

performing-ot-vulnerability-scanning-safely

When conducting vulnerability assessments in OT environments with legacy controllers When implementing continuous vulnerability monitoring without imp...

github 4 files

reverse-engineering-ios-app-with-frida

Use this skill when: Analyzing iOS app internals during authorized security assessments without source code Extracting encryption keys, API secrets, o...

github 8 files

securing-serverless-functions

When deploying Lambda functions or Azure Functions with access to sensitive data or cloud APIs When auditing existing serverless workloads for overly ...

github 4 files