mukul975/anthropic-cybersecurity-skills

770 skills13.9K total installsGithubGithubGitHub

acquiring-disk-image-with-dd-and-dcfldd

108

analyzing-api-gateway-access-logs

95

analyzing-android-malware-with-apktool

90

analyzing-cyber-kill-chain

84

analyzing-browser-forensics-with-hindsight

79

analyzing-active-directory-acl-abuse

78

analyzing-email-headers-for-phishing-investigation

75

analyzing-command-and-control-communication

75

conducting-api-security-testing

74

analyzing-cloud-storage-access-patterns

73

analyzing-network-traffic-with-wireshark

72

analyzing-certificate-transparency-for-phishing

70

analyzing-apt-group-with-mitre-navigator

69

analyzing-linux-audit-logs-for-intrusion

69

analyzing-azure-activity-logs-for-threats

68

analyzing-docker-container-forensics

68

analyzing-dns-logs-for-exfiltration

67

analyzing-network-packets-with-scapy

65

analyzing-linux-kernel-rootkits

65

testing-for-xss-vulnerabilities

64

conducting-network-penetration-test

64

analyzing-malicious-url-with-urlscan

64

performing-web-application-penetration-test

64

analyzing-network-traffic-of-malware

63

analyzing-ios-app-security-with-objection

62

analyzing-network-traffic-for-incidents

61

testing-jwt-token-security

61

exploiting-sql-injection-vulnerabilities

61

reverse-engineering-android-malware-with-jadx

61

testing-api-security-with-owasp-top-10

60

analyzing-bootkit-and-rootkit-samples

60

analyzing-linux-elf-malware

60

analyzing-indicators-of-compromise

58

analyzing-linux-system-artifacts

58

analyzing-disk-image-with-autopsy

57

conducting-external-reconnaissance-with-osint

57

analyzing-campaign-attribution-evidence

57

analyzing-ethereum-smart-contract-vulnerabilities

57

analyzing-kubernetes-audit-logs

56

analyzing-network-flow-data-with-netflow

55

analyzing-network-covert-channels-in-malware

54

analyzing-malware-sandbox-evasion-techniques

54

analyzing-threat-intelligence-feeds

53

analyzing-golang-malware-with-ghidra

52

analyzing-memory-dumps-with-volatility

52

analyzing-malicious-pdf-with-peepdf

52

exploiting-server-side-request-forgery

52

analyzing-heap-spray-exploitation

51

analyzing-cobaltstrike-malleable-c2-profiles

51

testing-for-xxe-injection-vulnerabilities

51

analyzing-cobalt-strike-beacon-configuration

51

analyzing-powershell-script-block-logging

50

analyzing-threat-actor-ttps-with-mitre-attack

50

analyzing-office365-audit-logs-for-compromise

50

performing-soc2-type2-audit-preparation

49

exploiting-sql-injection-with-sqlmap

49

testing-api-authentication-weaknesses

49

analyzing-malware-persistence-with-autoruns

49

analyzing-outlook-pst-for-email-forensics

49

testing-for-xss-vulnerabilities-with-burpsuite

48

collecting-open-source-intelligence

48

testing-api-for-broken-object-level-authorization

48

analyzing-web-server-logs-for-intrusion

48

analyzing-malware-family-relationships-with-malpedia

47

testing-for-sensitive-data-exposure

47

analyzing-malware-behavior-with-cuckoo-sandbox

47

analyzing-windows-event-logs-in-splunk

47

analyzing-macro-malware-in-office-documents

47

bypassing-authentication-with-forced-browsing

47

conducting-mobile-app-penetration-test

47

deobfuscating-javascript-malware

46

testing-for-json-web-token-vulnerabilities

46

analyzing-mft-for-deleted-file-recovery

46

analyzing-security-logs-with-splunk

45

performing-web-application-vulnerability-triage

45

conducting-cloud-penetration-testing

45

testing-for-host-header-injection

45

analyzing-powershell-empire-artifacts

45

testing-oauth2-implementation-flaws

44

conducting-full-scope-red-team-engagement

44

analyzing-memory-forensics-with-lime-and-volatility

44

testing-for-open-redirect-vulnerabilities

44

analyzing-ransomware-leak-site-intelligence

44

testing-cors-misconfiguration

44

analyzing-lnk-file-and-jump-list-artifacts

44

testing-for-broken-access-control

44

analyzing-ransomware-encryption-mechanisms

43

exploiting-idor-vulnerabilities

42

exploiting-api-injection-vulnerabilities

42

analyzing-packed-malware-with-upx-unpacker

42

auditing-aws-s3-bucket-permissions

41

analyzing-pdf-malware-with-pdfid

41

analyzing-ransomware-network-indicators

41

analyzing-threat-actor-ttps-with-mitre-navigator

41

analyzing-threat-landscape-with-misp

40

analyzing-typosquatting-domains-with-dnstwist

40

testing-for-xml-injection-vulnerabilities

40

analyzing-tls-certificate-transparency-logs

39

analyzing-supply-chain-malware-artifacts

39

performing-web-application-firewall-bypass

39

analyzing-persistence-mechanisms-in-linux

38

exploiting-nosql-injection-vulnerabilities

38

analyzing-prefetch-files-for-execution-history

37

exploiting-http-request-smuggling

37

building-vulnerability-scanning-workflow

37

testing-for-business-logic-vulnerabilities

36

testing-mobile-api-authentication

36

conducting-wireless-network-penetration-test

36

exploiting-websocket-vulnerabilities

35

performing-web-application-scanning-with-nikto

35

conducting-internal-reconnaissance-with-bloodhound-ce

35

analyzing-usb-device-connection-history

35

exploiting-oauth-misconfiguration

35

exploiting-template-injection-vulnerabilities

34

testing-for-email-header-injection

34

testing-api-for-mass-assignment-vulnerability

34

auditing-azure-active-directory-configuration

34

conducting-internal-network-penetration-test

34

analyzing-windows-prefetch-with-python

34

analyzing-windows-amcache-artifacts

33

analyzing-slack-space-and-file-system-artifacts

33

scanning-network-with-nmap-advanced

33

building-soc-playbook-for-ransomware

33

testing-websocket-api-security

33

analyzing-windows-registry-for-artifacts

32

exploiting-race-condition-vulnerabilities

32

conducting-pass-the-ticket-attack

32

building-incident-response-playbook

32

exploiting-mass-assignment-in-rest-apis

32

analyzing-sbom-for-supply-chain-vulnerabilities

32

exploiting-insecure-deserialization

31

auditing-gcp-iam-permissions

31

building-soc-metrics-and-kpi-tracking

31

building-threat-intelligence-platform

31

auditing-kubernetes-cluster-rbac

31

exploiting-prototype-pollution-in-javascript

31

reverse-engineering-ios-app-with-frida

30

building-attack-pattern-library-from-cti-reports

30

conducting-cloud-incident-response

30

analyzing-windows-shellbag-artifacts

30

performing-web-cache-poisoning-attack

30

auditing-cloud-with-cis-benchmarks

30

analyzing-windows-lnk-files-for-artifacts

29

building-automated-malware-submission-pipeline

29

auditing-terraform-infrastructure-for-security

29

deobfuscating-powershell-obfuscated-malware

29

performing-web-cache-deception-attack

29

exploiting-jwt-algorithm-confusion-attack

29

building-threat-actor-profile-from-osint

29

conducting-social-engineering-penetration-test

29

triaging-security-incident

29

building-vulnerability-dashboard-with-defectdojo

29

building-c2-infrastructure-with-sliver-framework

29

exploiting-broken-function-level-authorization

29

building-red-team-c2-infrastructure-with-havoc

29

performing-ssrf-vulnerability-exploitation

29

configuring-oauth2-authorization-flow

29

building-threat-intelligence-feed-integration

28

building-adversary-infrastructure-tracking-system

28

building-vulnerability-exception-tracking-system

28

building-soc-escalation-matrix

28

exploiting-active-directory-certificate-services-esc1

28

building-incident-response-dashboard

28

conducting-post-incident-lessons-learned

27

building-detection-rule-with-splunk-spl

27

building-malware-incident-communication-template

27

performing-api-rate-limiting-bypass

27

automating-ioc-enrichment

27

hardening-docker-containers-for-production

27

building-detection-rules-with-sigma

27

detecting-api-enumeration-attacks

27

collecting-threat-intelligence-with-misp

26

performing-graphql-security-assessment

26

conducting-man-in-the-middle-attack-simulation

26

performing-csrf-attack-simulation

26

exploiting-type-juggling-vulnerabilities

26

executing-red-team-engagement-planning

26

extracting-browser-history-artifacts

26

performing-api-security-testing-with-postman

26

conducting-domain-persistence-with-dcsync

26

performing-network-traffic-analysis-with-tshark

25

exploiting-broken-link-hijacking

25

reverse-engineering-malware-with-ghidra

25

performing-vulnerability-scanning-with-nessus

25

conducting-malware-incident-response

25

analyzing-ransomware-payment-wallets

25

triaging-security-incident-with-ir-playbook

25

exploiting-deeplink-vulnerabilities

25

conducting-phishing-incident-response

24

building-threat-hunt-hypothesis-framework

24

exploiting-active-directory-with-bloodhound

24

triaging-vulnerabilities-with-ssvc-framework

24

tracking-threat-actor-infrastructure

24

performing-active-directory-penetration-test

24

executing-red-team-exercise

24

prioritizing-vulnerabilities-with-cvss-scoring

24

performing-wifi-password-cracking-with-aircrack

23

testing-android-intents-for-vulnerabilities

23

conducting-social-engineering-pretext-call

23

analyzing-uefi-bootkit-persistence

23

exploiting-excessive-data-exposure-in-api

23

building-cloud-siem-with-sentinel

23

collecting-indicators-of-compromise

23

building-threat-intelligence-enrichment-in-splunk

23

exploiting-kerberoasting-with-impacket

23

building-vulnerability-aging-and-sla-tracking

23

exploiting-vulnerabilities-with-metasploit-framework

23

exploiting-insecure-data-storage-in-mobile

23

performing-jwt-none-algorithm-attack

22

exploiting-ipv6-vulnerabilities

22

performing-ssl-tls-security-assessment

22

exploiting-bgp-hijacking-vulnerabilities

22

conducting-memory-forensics-with-volatility

22

triaging-security-alerts-in-splunk

22

building-incident-timeline-with-timesketch

22

building-ioc-enrichment-pipeline-with-opencti

22

building-identity-federation-with-saml-azure-ad

22

scanning-docker-images-with-trivy

22

configuring-pfsense-firewall-rules

22

performing-subdomain-enumeration-with-subfinder

22

building-identity-governance-lifecycle-process

21

performing-api-inventory-and-discovery

21

collecting-volatile-evidence-from-compromised-host

21

auditing-tls-certificate-transparency-logs

21

configuring-network-segmentation-with-vlans

21

performing-hash-cracking-with-hashcat

21

building-ioc-defanging-and-sharing-pipeline

20

building-role-mining-for-rbac-optimization

20

building-devsecops-pipeline-with-gitlab-ci

20

performing-graphql-introspection-attack

20

conducting-spearphishing-simulation-campaign

20

building-phishing-reporting-button-workflow

19

reverse-engineering-rust-malware

19

configuring-tls-1-3-for-secure-communications

19

performing-directory-traversal-testing

19

securing-api-gateway-with-aws-waf

19

detecting-ai-model-prompt-injection-attacks

19

scanning-containers-with-trivy-in-cicd

19

securing-github-actions-workflows

19

configuring-host-based-intrusion-detection

19

building-threat-feed-aggregation-with-misp

19

performing-network-forensics-with-wireshark

18

scanning-container-images-with-grype

18

implementing-api-rate-limiting-and-throttling

18

performing-api-fuzzing-with-restler

18

exploiting-constrained-delegation-abuse

18

validating-backup-integrity-for-recovery

18

building-ransomware-playbook-with-cisa-framework

18

extracting-credentials-from-memory-dump

18

configuring-certificate-authority-with-openssl

18

performing-kubernetes-penetration-testing

18

performing-binary-exploitation-analysis

18

hardening-docker-daemon-configuration

18

performing-dark-web-monitoring-for-threats

18

configuring-windows-defender-advanced-settings

17

performing-privilege-escalation-on-linux

17

exploiting-nopac-cve-2021-42278-42287

17

performing-authenticated-vulnerability-scan

17

hardening-linux-endpoint-with-cis-benchmark

17

exploiting-smb-vulnerabilities-with-metasploit

17

performing-ssl-stripping-attack

17

performing-privilege-escalation-assessment

17

performing-container-security-scanning-with-trivy

17

performing-network-packet-capture-analysis

17

performing-http-parameter-pollution-attack

17

reverse-engineering-ransomware-encryption-routine

17

building-patch-tuesday-response-process

17

implementing-api-security-posture-management

16

performing-power-grid-cybersecurity-assessment

16

configuring-active-directory-tiered-model

16

performing-security-headers-audit

16

detecting-sql-injection-via-waf-logs

16

implementing-api-schema-validation-security

16

performing-wireless-network-penetration-test

16

deploying-cloudflare-access-for-zero-trust

16

monitoring-darkweb-sources

16

exploiting-zerologon-vulnerability-cve-2020-1472

16

implementing-jwt-signing-and-verification

16

reverse-engineering-dotnet-malware-with-dnspy

16

configuring-suricata-for-network-monitoring

16

hunting-advanced-persistent-threats

16

detecting-shadow-api-endpoints

16

performing-threat-modeling-with-owasp-threat-dragon

16

testing-ransomware-recovery-procedures

16

implementing-secret-scanning-with-gitleaks

16

correlating-threat-campaigns

15

extracting-windows-event-logs-artifacts

15

implementing-api-gateway-security-controls

15

performing-clickjacking-attack-test

15

performing-android-app-static-analysis-with-mobsf

15

configuring-aws-verified-access-for-ztna

15

scanning-kubernetes-manifests-with-kubesec

15

performing-wireless-security-assessment-with-kismet

15

performing-graphql-depth-limit-attack

15

deploying-tailscale-for-zero-trust-vpn

15

extracting-iocs-from-malware-samples

15

securing-aws-lambda-execution-roles

14

performing-blind-ssrf-exploitation

14

securing-serverless-functions

14

deploying-edr-agent-with-crowdstrike

14

scanning-infrastructure-with-nessus

14

exploiting-ms17-010-eternalblue-vulnerability

14

analyzing-cobalt-strike-malleable-profiles

14

hunting-for-dns-based-persistence

14

remediating-s3-bucket-misconfiguration

14

hunting-for-unusual-network-connections

14

performing-external-network-penetration-test

14

integrating-dast-with-owasp-zap-in-pipeline

14

configuring-windows-event-logging-for-detection

14

performing-active-directory-compromise-investigation

14

hunting-for-supply-chain-compromise

14

performing-firmware-malware-analysis

14

performing-osint-with-spiderfoot

14

generating-threat-intelligence-reports

14

performing-second-order-sql-injection

14

performing-user-behavior-analytics

14

configuring-microsegmentation-for-zero-trust

14

performing-ssl-tls-inspection-configuration

14

performing-packet-injection-attack

14

hunting-for-webshell-activity

14

performing-active-directory-bloodhound-analysis

14

detecting-aws-iam-privilege-escalation

14

performing-ai-driven-osint-correlation

13

detecting-dll-sideloading-attacks

13

securing-kubernetes-on-cloud

13

detecting-anomalous-authentication-patterns

13

performing-vlan-hopping-attack

13

configuring-hsm-for-key-storage

13

configuring-snort-ids-for-intrusion-detection

13

integrating-sast-into-github-actions-pipeline

13

securing-container-registry-images

13

detecting-email-account-compromise

13

performing-active-directory-vulnerability-assessment

13

performing-aws-privilege-escalation-assessment

13

performing-active-directory-forest-trust-attack

13

hunting-credential-stuffing-attacks

13

performing-privileged-account-discovery

13

performing-open-source-intelligence-gathering

13

implementing-api-key-security-controls

13

performing-cve-prioritization-with-kev-catalog

13

performing-mobile-app-certificate-pinning-bypass

13

implementing-api-abuse-detection-with-rate-limiting

13

intercepting-mobile-traffic-with-burpsuite

13

containing-active-breach

13

performing-content-security-policy-bypass

12

performing-memory-forensics-with-volatility3

12

detecting-insider-threat-behaviors

12

performing-network-traffic-analysis-with-zeek

12

performing-kerberoasting-attack

12

performing-red-team-with-covenant

12

configuring-identity-aware-proxy-with-google-iap

12

implementing-mitre-attack-coverage-mapping

12

performing-serverless-function-security-review

12

building-cloud-security-posture-management

12

securing-helm-chart-deployments

12

analyzing-phishing-email-headers

12

detecting-aws-cloudtrail-anomalies

12

performing-cloud-penetration-testing-with-pacu

12

deploying-palo-alto-prisma-access-zero-trust

12

detecting-anomalies-in-industrial-control-systems

12

detecting-email-forwarding-rules-attack

12

executing-phishing-simulation-campaign

12

implementing-pci-dss-compliance-controls

12

securing-remote-access-to-ot-environment

12

detecting-supply-chain-attacks-in-ci-cd

12

detecting-privilege-escalation-attempts

12

performing-threat-hunting-with-yara-rules

12

performing-endpoint-forensics-investigation

12

performing-ssl-certificate-lifecycle-management

12

hunting-for-spearphishing-indicators

11

implementing-aes-encryption-for-data-at-rest

11

mapping-mitre-attack-techniques

11

configuring-ldap-security-hardening

11

implementing-devsecops-security-scanning

11

performing-ot-vulnerability-assessment-with-claroty

11

deploying-osquery-for-endpoint-monitoring

11

implementing-network-access-control

11

performing-purple-team-exercise

11

performing-red-team-phishing-with-gophish

11

performing-oauth-scope-minimization-review

11

securing-aws-iam-permissions

11

implementing-kubernetes-pod-security-standards

11

performing-threat-landscape-assessment-for-sector

11

deploying-ransomware-canary-files

11

implementing-attack-surface-management

11

performing-sca-dependency-scanning-with-snyk

11

hunting-for-dcsync-attacks

11

performing-lateral-movement-with-wmiexec

11

hardening-windows-endpoint-with-cis-benchmark

11

conducting-mobile-application-penetration-test

11

performing-physical-intrusion-assessment

11

performing-ot-vulnerability-scanning-safely

11

eradicating-malware-from-infected-systems

11

detecting-attacks-on-scada-systems

11

detecting-broken-object-property-level-authorization

11

detecting-pass-the-hash-attacks

11

implementing-llm-guardrails-for-security

11

hunting-for-anomalous-powershell-execution

11

extracting-config-from-agent-tesla-rat

10

performing-service-account-credential-rotation

10

detecting-fileless-attacks-on-endpoints

10

hunting-for-suspicious-scheduled-tasks

10

hunting-for-data-exfiltration-indicators

10

detecting-dns-exfiltration-with-dns-query-analysis

10

detecting-dcsync-attack-in-active-directory

10

performing-container-image-hardening

10

implementing-aws-iam-permission-boundaries

10

detecting-lateral-movement-in-network

10

detecting-oauth-token-theft

10

performing-yara-rule-development-for-detection

10

implementing-security-chaos-engineering

10

implementing-threat-intelligence-lifecycle-management

10

implementing-api-security-testing-with-42crunch

10

extracting-memory-artifacts-with-rekall

10

performing-memory-forensics-with-volatility3-plugins

10

detecting-business-email-compromise-with-ai

10

performing-threat-hunting-with-elastic-siem

10

performing-agentless-vulnerability-scanning

10

hunting-for-unusual-service-installations

10

performing-supply-chain-attack-simulation

10

implementing-semgrep-for-custom-sast-rules

10

detecting-s3-data-exfiltration-attempts

10

performing-linux-log-forensics-investigation

10

performing-ios-app-security-assessment

10

performing-ot-network-security-assessment

10

performing-cryptographic-audit-of-application

10

performing-aws-account-enumeration-with-scout-suite

10

performing-nist-csf-maturity-assessment

10

conducting-cloud-infrastructure-penetration-test

10

performing-ransomware-response

10

securing-azure-with-microsoft-defender

10

detecting-kerberoasting-attacks

10

performing-kubernetes-cis-benchmark-with-kube-bench

10

performing-steganography-detection

10

configuring-multi-factor-authentication-with-duo

10

hunting-for-registry-run-key-persistence

10

hunting-for-dns-tunneling-with-zeek

10

detecting-ransomware-precursors-in-network

10

detecting-arp-poisoning-in-network-traffic

10

configuring-zscaler-private-access-for-ztna

9

profiling-threat-actor-groups

9

implementing-network-intrusion-prevention-with-suricata

9

performing-cloud-asset-inventory-with-cartography

9

performing-credential-access-with-lazagne

9

hunting-for-ntlm-relay-attacks

9

performing-malware-persistence-investigation

9

performing-thick-client-application-penetration-test

9

performing-plc-firmware-security-analysis

9

implementing-zero-trust-in-cloud

9

performing-service-account-audit

9

implementing-cloud-vulnerability-posture-management

9

implementing-api-threat-protection-with-apigee

9

performing-adversary-in-the-middle-phishing-detection

9

detecting-suspicious-oauth-application-consent

9

correlating-security-events-in-qradar

9

hunting-for-persistence-mechanisms-in-windows

9

implementing-google-workspace-phishing-protection

9

performing-dns-enumeration-and-zone-transfer

9

hunting-for-process-injection-techniques

9

detecting-network-scanning-with-ids-signatures

9

detecting-business-email-compromise

9

hunting-for-command-and-control-beaconing

9

performing-authenticated-scan-with-openvas

9

performing-dynamic-analysis-of-android-app

9

detecting-aws-guardduty-findings-automation

9

detecting-container-escape-attempts

9

executing-active-directory-attack-simulation

9

performing-mobile-device-forensics-with-cellebrite

9

detecting-cryptomining-in-cloud

9

performing-timeline-reconstruction-with-plaso

9

detecting-modbus-command-injection-attacks

9

performing-arp-spoofing-attack-simulation

9

hunting-for-lateral-movement-via-wmi

9

performing-disk-forensics-investigation

9

performing-malware-triage-with-yara

9

detecting-network-anomalies-with-zeek

9

performing-phishing-simulation-with-gophish

8

performing-gcp-security-assessment-with-forseti

8

implementing-network-segmentation-for-ot

8

implementing-threat-modeling-with-mitre-attack

8

performing-threat-emulation-with-atomic-red-team

8

recovering-from-ransomware-attack

8

hunting-for-scheduled-task-persistence

8

implementing-gdpr-data-protection-controls

8

detecting-shadow-it-cloud-usage

8

implementing-google-workspace-sso-configuration

8

performing-privileged-account-access-review

8

implementing-attack-path-analysis-with-xm-cyber

8

performing-kubernetes-etcd-security-assessment

8

implementing-network-access-control-with-cisco-ise

8

performing-cloud-native-forensics-with-falco

8

detecting-port-scanning-with-fail2ban

8

implementing-rsa-key-pair-management

8

implementing-aqua-security-for-container-scanning

8

implementing-mobile-application-management

8

performing-privacy-impact-assessment

8

performing-malware-ioc-extraction

8

performing-malware-hash-enrichment-with-virustotal

8

implementing-privileged-session-monitoring

8

implementing-vulnerability-management-with-greenbone

8

implementing-network-policies-for-kubernetes

8

hunting-for-living-off-the-cloud-techniques

8

performing-dns-tunneling-detection

8

performing-docker-bench-security-assessment

8

hunting-for-shadow-copy-deletion

8

detecting-lateral-movement-with-splunk

8

hunting-for-cobalt-strike-beacons

8

hunting-for-domain-fronting-c2-traffic

8

implementing-zero-trust-for-saas-applications

8

performing-ransomware-tabletop-exercise

8

performing-soc-tabletop-exercise

8

performing-firmware-extraction-with-binwalk

8

implementing-network-segmentation-with-firewall-zones

8

performing-log-analysis-for-forensic-investigation

8

detecting-azure-lateral-movement

8

hunting-for-t1098-account-manipulation

8

detecting-insider-threat-with-ueba

8

detecting-dnp3-protocol-anomalies

8

detecting-azure-storage-account-misconfigurations

8

hunting-for-data-staging-before-exfiltration

8

performing-paste-site-monitoring-for-credentials

8

detecting-deepfake-audio-in-vishing-attacks

8

investigating-phishing-email-incident

8

implementing-anti-phishing-training-program

8

implementing-web-application-logging-with-modsecurity

8

implementing-secrets-scanning-in-ci-cd

8

implementing-alert-fatigue-reduction

8

detecting-credential-dumping-techniques

8

securing-historian-server-in-ot-environment

8

implementing-secrets-management-with-vault

8

hunting-for-lolbins-execution-in-endpoint-logs

8

performing-endpoint-vulnerability-remediation

8

evaluating-threat-intelligence-platforms

8

performing-threat-intelligence-sharing-with-misp

8

implementing-end-to-end-encryption-for-messaging

8

implementing-zero-trust-network-access

8

detecting-golden-ticket-attacks-in-kerberos-logs

8

performing-iot-security-assessment

8

performing-automated-malware-analysis-with-cape

8

performing-indicator-lifecycle-management

8

hunting-for-registry-persistence-mechanisms

8

detecting-azure-service-principal-abuse

7

implementing-ddos-mitigation-with-cloudflare

7

performing-scada-hmi-security-assessment

7

detecting-exfiltration-over-dns-with-zeek

7

performing-purple-team-atomic-testing

7

implementing-google-workspace-admin-security

7

detecting-cloud-threats-with-guardduty

7

performing-cloud-log-forensics-with-athena

7

implementing-next-generation-firewall-with-palo-alto

7

detecting-attacks-on-historian-servers

7

implementing-pod-security-admission-controller

7

detecting-serverless-function-injection

7

implementing-hashicorp-vault-dynamic-secrets

7

implementing-application-whitelisting-with-applocker

7

hunting-for-persistence-via-wmi-subscriptions

7

performing-access-review-and-certification

7

implementing-github-advanced-security-for-code-scanning

7

detecting-suspicious-powershell-execution

7

securing-container-registry-with-harbor

7

performing-oil-gas-cybersecurity-assessment

7

implementing-ransomware-backup-strategy

7

implementing-rbac-hardening-for-kubernetes

7

implementing-iso-27001-information-security-management

7

performing-false-positive-reduction-in-siem

7

performing-fuzzing-with-aflplusplus

7

performing-bluetooth-security-assessment

7

deploying-software-defined-perimeter

7

implementing-network-traffic-analysis-with-arkime

7

implementing-infrastructure-as-code-security-scanning

7

detecting-typosquatting-packages-in-npm-pypi

7

detecting-container-escape-with-falco-rules

7

performing-soap-web-service-security-testing

7

performing-static-malware-analysis-with-pe-studio

7

processing-stix-taxii-feeds

7

hunting-for-defense-evasion-via-timestomping

7

implementing-siem-correlation-rules-for-apt

7

performing-container-escape-detection

7

detecting-fileless-malware-techniques

7

performing-lateral-movement-detection

7

auditing-kubernetes-rbac-permissions

7

performing-ip-reputation-analysis-with-shodan

7

performing-cloud-incident-containment-procedures

7

deploying-active-directory-honeytokens

7

implementing-ot-network-traffic-analysis-with-nozomi

7

hunting-for-startup-folder-persistence

7

hunting-for-living-off-the-land-binaries

7

performing-dmarc-policy-enforcement-rollout

7

detecting-aws-credential-exposure-with-trufflehog

7

performing-dynamic-analysis-with-any-run

7

implementing-cisa-zero-trust-maturity-model

7

detecting-process-injection-techniques

7

implementing-zero-knowledge-proof-for-authentication

7

implementing-aws-config-rules-for-compliance

7

detecting-process-hollowing-technique

7

performing-asset-criticality-scoring-for-vulns

7

implementing-anti-ransomware-group-policy

7

deploying-decoy-files-for-ransomware-detection

7

performing-windows-artifact-analysis-with-eric-zimmerman-tools

6

implementing-privileged-access-management-with-cyberark

6

implementing-endpoint-dlp-controls

6

implementing-dmarc-dkim-spf-email-security

6

detecting-golden-ticket-forgery

6

detecting-qr-code-phishing-with-email-security

6

detecting-living-off-the-land-with-lolbas

6

investigating-insider-threat-indicators

6

implementing-passwordless-auth-with-microsoft-entra

6

implementing-patch-management-for-ot-systems

6

detecting-container-drift-at-runtime

6

detecting-spearphishing-with-email-gateway

6

implementing-zero-trust-with-hashicorp-boundary

6

implementing-cloud-waf-rules

6

detecting-modbus-protocol-anomalies

6

implementing-kubernetes-network-policy-with-calico

6

performing-sqlite-database-forensics

6

implementing-runtime-application-self-protection

6

implementing-epss-score-for-vulnerability-prioritization

6

detecting-insider-data-exfiltration-via-dlp

6

detecting-pass-the-ticket-attacks

6

implementing-pam-for-database-access

6

implementing-zero-trust-dns-with-nextdns

6

implementing-azure-defender-for-cloud

6

implementing-policy-as-code-with-open-policy-agent

6

performing-ics-asset-discovery-with-claroty

6

detecting-mimikatz-execution-patterns

6

implementing-aws-security-hub-compliance

6

managing-intelligence-lifecycle

6

implementing-identity-verification-for-zero-trust

6

detecting-privilege-escalation-in-kubernetes-pods

6

performing-cloud-forensics-with-aws-cloudtrail

6

managing-cloud-identity-with-okta

6

implementing-ransomware-kill-switch-detection

6

performing-brand-monitoring-for-impersonation

6

detecting-rdp-brute-force-attacks

6

detecting-compromised-cloud-credentials

6

implementing-gdpr-data-subject-access-request

6

performing-insider-threat-investigation

6

implementing-network-traffic-baselining

6

implementing-aws-security-hub

6

performing-cloud-forensics-investigation

6

implementing-patch-management-workflow

6

implementing-endpoint-detection-with-wazuh

6

hunting-for-dcom-lateral-movement

6

performing-hardware-security-module-integration

6

detecting-service-account-abuse

6

detecting-stuxnet-style-attacks

6

performing-file-carving-with-foremost

6

detecting-living-off-the-land-attacks

6

detecting-bluetooth-low-energy-attacks

6

implementing-beyondcorp-zero-trust-access-model

6

hunting-for-beaconing-with-frequency-analysis

6

implementing-azure-ad-privileged-identity-management

6

performing-gcp-penetration-testing-with-gcpbucketbrute

6

performing-cloud-storage-forensic-acquisition

6

implementing-gcp-binary-authorization

6

implementing-code-signing-for-artifacts

6

implementing-identity-governance-with-sailpoint

5

implementing-scim-provisioning-with-okta

5

implementing-fuzz-testing-in-cicd-with-aflplusplus

5

implementing-vulnerability-remediation-sla

5

implementing-immutable-backup-with-restic

5

detecting-t1055-process-injection-with-sysmon

5

performing-entitlement-review-with-sailpoint-iiq

5

implementing-stix-taxii-feed-integration

5

implementing-honeytokens-for-breach-detection

5

performing-bandwidth-throttling-attack-simulation

5

implementing-memory-protection-with-dep-aslr

5

implementing-network-deception-with-honeypots

5

implementing-siem-use-case-tuning

5

implementing-zero-trust-network-access-with-zscaler

5

investigating-ransomware-attack-artifacts

5

detecting-beaconing-patterns-with-zeek

5

detecting-mobile-malware-behavior

5

implementing-soar-automation-with-phantom

5

implementing-bgp-security-with-rpki

5

implementing-mimecast-targeted-attack-protection

5

performing-cloud-native-threat-hunting-with-aws-detective

5

implementing-gcp-vpc-firewall-rules

5

detecting-wmi-persistence

5

implementing-container-network-policies-with-calico

5

implementing-aws-macie-for-data-classification

5

implementing-privileged-access-workstation

5

performing-post-quantum-cryptography-migration

5

performing-deception-technology-deployment

5

implementing-canary-tokens-for-network-intrusion

5

implementing-cloud-workload-protection

5

implementing-log-integrity-with-blockchain

5

performing-ioc-enrichment-automation

5

implementing-rapid7-insightvm-for-scanning

5

implementing-aws-nitro-enclave-security

5

implementing-browser-isolation-for-zero-trust

5

implementing-supply-chain-security-with-in-toto

5

performing-s7comm-protocol-security-analysis

5

performing-log-source-onboarding-in-siem

5

implementing-iec-62443-security-zones

5

performing-alert-triage-with-elastic-siem

5

performing-initial-access-with-evilginx3

5

implementing-cloud-security-posture-management

5

recovering-deleted-files-with-photorec

5

implementing-image-provenance-verification-with-cosign

5

performing-cloud-penetration-testing

5

implementing-soar-playbook-with-palo-alto-xsoar

5

implementing-cloud-trail-log-analysis

4

implementing-proofpoint-email-security-gateway

4

implementing-file-integrity-monitoring-with-aide

4

implementing-dragos-platform-for-ot-monitoring

4

implementing-container-image-minimal-base-with-distroless

4

implementing-data-loss-prevention-with-microsoft-purview

4

implementing-mtls-for-zero-trust-services

4

implementing-passwordless-authentication-with-fido2

4

implementing-sigstore-for-software-signing

4

implementing-hardware-security-key-authentication

4

implementing-zero-standing-privilege-with-cyberark

4

implementing-digital-signatures-with-ed25519

4

implementing-device-posture-assessment-in-zero-trust

4

implementing-saml-sso-with-okta

4

implementing-log-forwarding-with-fluentd

4

implementing-diamond-model-analysis

4

implementing-security-monitoring-with-datadog

4

detecting-rootkit-activity

4

implementing-nerc-cip-compliance-controls

4

implementing-conduit-security-for-ot-remote-access

4

implementing-velociraptor-for-ir-collection

4

implementing-vulnerability-sla-breach-alerting

4

detecting-command-and-control-over-dns

4

implementing-just-in-time-access-provisioning

4

implementing-usb-device-control-policy

4

implementing-gcp-organization-policy-constraints

4

detecting-t1003-credential-dumping-with-edr

4

implementing-siem-use-cases-for-detection

4

implementing-disk-encryption-with-bitlocker

4

detecting-ntlm-relay-with-event-correlation

4

performing-access-recertification-with-saviynt

4

containing-active-security-breach

4

implementing-cloud-dlp-for-data-protection

4

implementing-microsegmentation-with-guardicore

4

detecting-t1548-abuse-elevation-control-mechanism

4

implementing-ot-incident-response-playbook

4

implementing-zero-trust-with-beyondcorp

4

detecting-evasion-techniques-in-endpoint-logs

4

implementing-email-sandboxing-with-proofpoint

4

implementing-envelope-encryption-with-aws-kms

4

detecting-ransomware-encryption-behavior

4

implementing-opa-gatekeeper-for-policy-enforcement

4

implementing-ticketing-system-for-incidents

4

implementing-runtime-security-with-tetragon

4

implementing-continuous-security-validation-with-bas

4

implementing-deception-based-detection-with-canarytoken

4

implementing-ics-firewall-with-tofino

3

implementing-taxii-server-with-opentaxii

3

implementing-syslog-centralization-with-rsyslog

3

detecting-malicious-scheduled-tasks-with-sysmon

3

implementing-security-information-sharing-with-stix2

3

implementing-delinea-secret-server-for-pam

3

monitoring-scada-modbus-traffic-anomalies

3

implementing-conditional-access-policies-azure-ad

3

implementing-purdue-model-network-segmentation

3

detecting-misconfigured-azure-storage

3

implementing-soar-playbook-for-phishing

3

implementing-honeypot-for-ransomware-detection

3

implementing-ebpf-security-monitoring

3

detecting-cloud-cryptomining-activity

2

hunting-living-off-the-land-binaries

2

performing-ransomware-incident-response

2

detecting-lateral-movement-with-zeek

2

implementing-threat-intelligence-platform

1

implementing-rbac-for-kubernetes-cluster

1

hunting-for-webshells-in-web-servers

1

detecting-golden-ticket-attacks

1

executing-diamond-model-analysis

1