Found 699 skills for "mukul975" Page 44 of 59

performing-malware-hash-enrichment-with-virustotal

VirusTotal is the world's largest crowdsourced malware corpus, scanning files with 70+ antivirus engines and providing behavioral analysis, YARA rule ...

github 4 files

performing-malware-persistence-investigation

When investigating how malware maintains presence on a compromised system after reboots During incident response to identify all persistence mechanism...

github 4 files

implementing-purdue-model-network-segmentation

When designing or retrofitting network architecture for an ICS/SCADA environment When implementing IEC 62443 zone and conduit requirements in a brownf...

github 4 files

performing-security-headers-audit

During authorized web application security assessments as a standard configuration review When evaluating browser-level protections against XSS, click...

github 4 files

intercepting-mobile-traffic-with-burpsuite

Use this skill when: Testing mobile application API endpoints for authentication, authorization, and injection vulnerabilities Analyzing data transmit...

github 8 files

detecting-cloud-threats-with-guardduty

When establishing continuous threat detection for new or existing AWS accounts When investigating GuardDuty findings related to compromised instances,...

github 4 files

deploying-palo-alto-prisma-access-zero-trust

When implementing enterprise-grade SASE with integrated ZTNA, SWG, CASB, and FWaaS When replacing both VPN and branch office firewalls with cloud-deli...

github 4 files

conducting-social-engineering-penetration-test

Social engineering penetration testing assesses an organization's human attack surface through controlled simulation of real-world deception technique...

github 8 files

implementing-image-provenance-verification-with-cosign

Cosign is a Sigstore tool for signing, verifying, and attaching metadata to container images and OCI artifacts. It supports both key-based and keyless...

github 8 files

implementing-network-segmentation-for-ot

When an OT security assessment reveals a flat network with no segmentation between Purdue levels When implementing IEC 62443 zone/conduit architecture...

github 4 files

analyzing-windows-registry-for-artifacts

When investigating user activity on a Windows system during an incident For identifying autorun/persistence mechanisms used by malware When tracing in...

github 4 files

implementing-syslog-centralization-with-rsyslog

When deploying or configuring implementing syslog centralization with rsyslog capabilities in your environment When establishing security controls ali...

github 4 files