Found 699 skills for "mukul975" Page 36 of 59

configuring-network-segmentation-with-vlans

Segmenting an enterprise network into isolated security zones (corporate, servers, DMZ, guest, IoT) Meeting compliance requirements (PCI-DSS, HIPAA, S...

github 4 files

building-phishing-reporting-button-workflow

A phishing reporting button empowers users to flag suspicious emails directly from their email client, creating a critical feedback loop between end u...

github 8 files

configuring-snort-ids-for-intrusion-detection

Deploying a network-based intrusion detection system to monitor traffic at key network boundaries Writing custom Snort rules to detect organization-sp...

github 4 files

configuring-windows-defender-advanced-settings

Use this skill when: Configuring Microsoft Defender for Endpoint (MDE) beyond default settings for enhanced protection Implementing Attack Surface Red...

github 8 files

conducting-man-in-the-middle-attack-simulation

Testing whether applications properly validate TLS certificates and enforce encrypted communications Demonstrating the risk of cleartext protocols (HT...

github 4 files

conducting-mobile-app-penetration-test

Testing mobile applications before release to identify security vulnerabilities and data protection issues Conducting compliance assessments against O...

github 4 files

conducting-network-penetration-test

Assessing the security posture of internal or external network infrastructure before or after deployment Validating firewall rules, network segmentati...

github 4 files

conducting-pass-the-ticket-attack

Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...

github 8 files

building-vulnerability-scanning-workflow

Use this skill when: SOC teams need to establish or improve recurring vulnerability scanning programs Scan results require prioritization beyond raw C...

github 4 files

bypassing-authentication-with-forced-browsing

During authorized penetration tests to discover hidden or unprotected administrative pages When testing whether authentication is consistently enforce...

github 4 files

collecting-indicators-of-compromise

During active incident response to identify and block adversary infrastructure Post-incident to document all observed adversary artifacts for future d...

github 4 files

collecting-threat-intelligence-with-misp

MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform for gathering, sharing, storing, and correlating Indicators...

github 8 files