Found 699 skills for "mukul975" Page 31 of 59

testing-for-email-header-injection

When testing contact forms, feedback forms, or "email a friend" functionality During assessment of password reset email functionality When testing new...

github 4 files

analyzing-indicators-of-compromise

Use this skill when: A phishing email or alert generates IOCs (URLs, IP addresses, file hashes) requiring rapid triage Automated feeds deliver bulk IO...

github 4 files

implementing-network-access-control-with-cisco-ise

Cisco Identity Services Engine (ISE) provides centralized network access control through 802.1X authentication, MAC Authentication Bypass (MAB), postu...

github 4 files

evaluating-threat-intelligence-platforms

Use this skill when: Conducting a formal RFP or vendor evaluation for a TIP solution Assessing whether the current TIP (e.g., MISP) needs to be replac...

github 4 files

deobfuscating-javascript-malware

Investigating a phishing page with obfuscated JavaScript that performs credential harvesting or redirect Analyzing a web skimmer (Magecart-style) inje...

github 4 files

performing-network-packet-capture-analysis

Network packet captures (PCAP/PCAPNG files) represent the ultimate source of truth about network activity and provide irrefutable evidence of communic...

github 8 files

implementing-digital-signatures-with-ed25519

Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit security with 64-byte signatures and...

github 8 files

analyzing-web-server-logs-for-intrusion

When investigating security incidents that require analyzing web server logs for intrusion When building detection rules or threat hunting queries for...

github 4 files

implementing-browser-isolation-for-zero-trust

When deploying remote browser isolation as part of a Zero Trust security architecture When protecting users from zero-day browser exploits and drive-b...

github 4 files

performing-disk-forensics-investigation

A security incident requires forensic analysis of a system's persistent storage Evidence preservation is needed for potential legal proceedings or HR ...

github 4 files

performing-cve-prioritization-with-kev-catalog

The CISA Known Exploited Vulnerabilities (KEV) catalog, established through Binding Operational Directive (BOD) 22-01, is a living list of CVEs that h...

github 8 files

performing-subdomain-enumeration-with-subfinder

During the reconnaissance phase of penetration testing or bug bounty hunting When mapping the external attack surface of a target organization Before ...

github 8 files