Found 699 skills for "mukul975" Page 32 of 59

implementing-secret-scanning-with-gitleaks

When developers may accidentally commit API keys, passwords, tokens, or private keys to repositories When establishing pre-commit gates that prevent s...

github 8 files

analyzing-cyber-kill-chain

Use this skill when: Conducting post-incident analysis to determine how far an adversary progressed through an attack sequence Designing layered defen...

github 4 files

hunting-for-living-off-the-land-binaries

When investigating fileless malware campaigns that bypass traditional AV During proactive threat hunts targeting defense evasion techniques When EDR a...

github 8 files

auditing-cloud-with-cis-benchmarks

When performing initial security audits of cloud environments against industry-standard benchmarks When preparing for SOC 2, ISO 27001, or regulatory ...

github 4 files

performing-network-traffic-analysis-with-tshark

This skill automates packet capture analysis using tshark (Wireshark CLI) and pyshark (Python wrapper). It extracts protocol distribution statistics, ...

github 4 files

analyzing-windows-amcache-artifacts

Determining which programs have existed or executed on a Windows system during incident response Correlating SHA-1 hashes from Amcache against known m...

github 4 files

analyzing-windows-prefetch-with-python

Windows Prefetch files (.pf) record application execution data including executable names, run counts, timestamps, loaded DLLs, and accessed directori...

github 4 files

auditing-azure-active-directory-configuration

When performing a security assessment of an Azure tenant's identity configuration When compliance audits require review of authentication policies, MF...

github 4 files

analyzing-powershell-script-block-logging

When investigating security incidents that require analyzing powershell script block logging When building detection rules or threat hunting queries f...

github 4 files

analyzing-ransomware-leak-site-intelligence

Ransomware groups operating under double-extortion models maintain data leak sites (DLS) on Tor hidden services where they post victim names, stolen d...

github 4 files

analyzing-ransomware-network-indicators

Before and during ransomware execution, adversaries establish C2 channels, exfiltrate data, and download encryption keys. This skill analyzes Zeek con...

github 4 files

analyzing-network-traffic-for-incidents

SIEM alerts on anomalous network traffic patterns requiring deeper investigation C2 beaconing is suspected and needs confirmation through packet-level...

github 4 files