Found 699 skills for "mukul975" Page 41 of 59

implementing-endpoint-dlp-controls

Use this skill when: Deploying endpoint DLP to prevent sensitive data (PII, PHI, PCI) from leaving the organization Configuring content inspection rul...

github 8 files

analyzing-threat-landscape-with-misp

When investigating security incidents that require analyzing threat landscape with misp When building detection rules or threat hunting queries for th...

github 4 files

configuring-multi-factor-authentication-with-duo

Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration method...

github 8 files

detecting-kerberoasting-attacks

When proactively hunting for indicators of detecting kerberoasting attacks in the environment After threat intelligence indicates active campaigns usi...

github 8 files

detecting-dns-exfiltration-with-dns-query-analysis

DNS exfiltration exploits the Domain Name System as a covert channel to extract data from compromised networks. Attackers encode stolen data into DNS ...

github 4 files

detecting-credential-dumping-techniques

Credential dumping (MITRE ATT&CK T1003) is a post-exploitation technique where adversaries extract authentication credentials from OS memory, registry...

github 5 files

implementing-code-signing-for-artifacts

When establishing artifact integrity verification to prevent supply chain tampering When compliance requires cryptographic proof that build artifacts ...

github 8 files

building-red-team-c2-infrastructure-with-havoc

Havoc is a modern, open-source post-exploitation command and control (C2) framework created by C5pider. It provides a collaborative multi-operator int...

github 8 files

analyzing-browser-forensics-with-hindsight

Hindsight is an open-source browser forensics tool designed to parse artifacts from Google Chrome and other Chromium-based browsers (Microsoft Edge, B...

github 8 files

performing-linux-log-forensics-investigation

Linux systems maintain extensive logs that serve as primary evidence sources in forensic investigations. Unlike Windows Event Logs, Linux logs are typ...

github 8 files

performing-privilege-escalation-on-linux

Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...

github 6 files

building-vulnerability-dashboard-with-defectdojo

DefectDojo is an open-source application vulnerability management platform that aggregates findings from 200+ security tools, deduplicates results, tr...

github 8 files