Found 699 skills for "mukul975" Page 50 of 59

analyzing-mft-for-deleted-file-recovery

The NTFS Master File Table ($MFT) is the central metadata repository for every file and directory on an NTFS volume. Each file is represented by at le...

github 8 files

implementing-sigstore-for-software-signing

Signing container images and software artifacts without managing long-lived cryptographic keys Establishing verifiable provenance for build outputs in...

github 4 files

analyzing-sbom-for-supply-chain-vulnerabilities

A new regulatory requirement (EO 14028, EU CRA) mandates SBOM analysis for software deliveries Security team needs to assess third-party risk by scann...

github 4 files

implementing-vulnerability-remediation-sla

Vulnerability remediation SLAs define mandatory timeframes for patching or mitigating identified vulnerabilities based on severity, asset criticality,...

github 8 files

implementing-usb-device-control-policy

Use this skill when: Restricting USB storage devices to prevent data exfiltration or malware introduction Implementing device control policies via GPO...

github 8 files

detecting-process-injection-techniques

EDR alerts on suspicious API call sequences (VirtualAllocEx + WriteProcessMemory + CreateRemoteThread) A legitimate process (explorer.exe, svchost.exe...

github 4 files

performing-content-security-policy-bypass

When XSS is found but execution is blocked by Content Security Policy During web application security assessments to evaluate CSP effectiveness When t...

github 4 files

implementing-azure-ad-privileged-identity-management

Microsoft Entra Privileged Identity Management (PIM) provides time-based and approval-based role activation to mitigate risks from excessive, unnecess...

github 8 files

detecting-modbus-protocol-anomalies

When deploying Modbus-specific intrusion detection in an OT environment When building baseline models for deterministic Modbus polling patterns When i...

github 4 files

generating-threat-intelligence-reports

Use this skill when: Producing weekly, monthly, or quarterly threat intelligence summaries for security leadership Creating a rapid intelligence asses...

github 4 files

testing-for-business-logic-vulnerabilities

During authorized penetration tests when automated scanners have found few technical vulnerabilities When assessing e-commerce platforms for pricing, ...

github 4 files

performing-hardware-security-module-integration

Hardware Security Modules (HSMs) provide tamper-resistant cryptographic key storage and operations. This skill covers integrating with HSMs via the PK...

github 4 files