\ No newline at end of file
diff --git a/personas/_shared/anthropic-cybersecurity-skills/CITATION.cff b/personas/_shared/anthropic-cybersecurity-skills/CITATION.cff
new file mode 100644
index 0000000..807b051
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/CITATION.cff
@@ -0,0 +1,32 @@
+cff-version: 1.2.0
+message: "If you use this repository in your research, tools, or publications, please cite it as below."
+type: software
+title: "Anthropic-Cybersecurity-Skills"
+abstract: >
+ A structured collection of 753 cybersecurity skills for AI agents, covering
+ penetration testing, digital forensics, threat intelligence, incident response,
+ cloud security, OT/SCADA security, AI security, and more. Each skill follows
+ a standardized format with YAML frontmatter metadata, step-by-step procedures,
+ tool commands, expected outputs, and MITRE ATT&CK mappings. Compatible with
+ Claude Code, GitHub Copilot, Cursor, Windsurf, Gemini CLI, and 20+ AI agent
+ platforms.
+authors:
+ - name: "Mahipal"
+ email: mukuljangra5@gmail.com
+ alias: mukul975
+repository-code: "https://github.com/mukul975/Anthropic-Cybersecurity-Skills"
+url: "https://github.com/mukul975/Anthropic-Cybersecurity-Skills"
+license: Apache-2.0
+version: "1.1.0"
+date-released: "2026-03-21"
+keywords:
+ - cybersecurity
+ - AI agents
+ - skills
+ - penetration testing
+ - digital forensics
+ - threat intelligence
+ - incident response
+ - MITRE ATT&CK
+ - Claude Code
+ - open source
diff --git a/personas/_shared/anthropic-cybersecurity-skills/CODE_OF_CONDUCT.md b/personas/_shared/anthropic-cybersecurity-skills/CODE_OF_CONDUCT.md
new file mode 100644
index 0000000..90a4a45
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/CODE_OF_CONDUCT.md
@@ -0,0 +1,83 @@
+# Contributor Covenant Code of Conduct
+
+## Our Pledge
+
+We as members, contributors, and leaders pledge to make participation in our community a harassment-free experience for everyone, regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, level of experience, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
+
+We pledge to act and interact in ways that contribute to an open, welcoming, diverse, inclusive, and healthy community.
+
+## Our Standards
+
+Examples of behavior that contributes to a positive environment for our community include:
+
+* Demonstrating empathy and kindness toward other people
+* Being respectful of differing opinions, viewpoints, and experiences
+* Giving and gracefully accepting constructive feedback
+* Accepting responsibility and apologizing to those affected by our mistakes, and learning from the experience
+* Focusing on what is best not just for us as individuals, but for the overall community
+
+Examples of unacceptable behavior include:
+
+* The use of sexualized language or imagery, and sexual attention or advances of any kind
+* Trolling, insulting or derogatory comments, and personal or political attacks
+* Public or private harassment
+* Publishing others' private information, such as a physical or email address, without their explicit permission
+* Other conduct which could reasonably be considered inappropriate in a professional setting
+
+## Enforcement Responsibilities
+
+Community leaders are responsible for clarifying and enforcing our standards of acceptable behavior and will take appropriate and fair corrective action in response to any behavior that they deem inappropriate, threatening, offensive, or harmful.
+
+Community leaders have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, and will communicate reasons for moderation decisions when appropriate.
+
+## Scope
+
+This Code of Conduct applies within all community spaces, and also applies when an individual is officially representing the community in public spaces. Examples of representing our community include using an official e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event.
+
+## Enforcement
+
+Instances of abusive, harassing, or otherwise unacceptable behavior may be reported to the community leaders responsible for enforcement at mukuljangra5@gmail.com. All complaints will be reviewed and investigated promptly and fairly.
+
+All community leaders are obligated to respect the privacy and security of the reporter of any incident.
+
+## Enforcement Guidelines
+
+Community leaders will follow these Community Impact Guidelines in determining the consequences for any action they deem in violation of this Code of Conduct:
+
+### 1. Correction
+
+**Community Impact**: Use of inappropriate language or other behavior deemed unprofessional or unwelcome in the community.
+
+**Consequence**: A private, written warning from community leaders, providing clarity around the nature of the violation and an explanation of why the behavior was inappropriate. A public apology may be requested.
+
+### 2. Warning
+
+**Community Impact**: A violation through a single incident or series of actions.
+
+**Consequence**: A warning with consequences for continued behavior. No interaction with the people involved, including unsolicited interaction with those enforcing the Code of Conduct, for a specified period of time. This includes avoiding interactions in community spaces as well as external channels like social media. Violating these terms may lead to a temporary or permanent ban.
+
+### 3. Temporary Ban
+
+**Community Impact**: A serious violation of community standards, including sustained inappropriate behavior.
+
+**Consequence**: A temporary ban from any sort of interaction or public communication with the community for a specified period of time. No public or private interaction with the people involved, including unsolicited interaction with those enforcing the Code of Conduct, is allowed during this period. Violating these terms may lead to a permanent ban.
+
+### 4. Permanent Ban
+
+**Community Impact**: Demonstrating a pattern of violation of community standards, including sustained inappropriate behavior, harassment of an individual, or aggression toward or disparagement of classes of individuals.
+
+**Consequence**: A permanent ban from any sort of public interaction within the community.
+
+## Attribution
+
+This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 2.1, available at [https://www.contributor-covenant.org/version/2/1/code_of_conduct.html][v2.1].
+
+Community Impact Guidelines were inspired by [Mozilla's code of conduct enforcement ladder][Mozilla CoC].
+
+For answers to common questions about this code of conduct, see the FAQ at [https://www.contributor-covenant.org/faq][FAQ]. Translations are available at [https://www.contributor-covenant.org/translations][translations].
+
+[homepage]: https://www.contributor-covenant.org
+[v2.1]: https://www.contributor-covenant.org/version/2/1/code_of_conduct.html
+[Mozilla CoC]: https://github.com/mozilla/diversity
+[FAQ]: https://www.contributor-covenant.org/faq
+[translations]: https://www.contributor-covenant.org/translations
diff --git a/personas/_shared/anthropic-cybersecurity-skills/CONTRIBUTING.md b/personas/_shared/anthropic-cybersecurity-skills/CONTRIBUTING.md
new file mode 100644
index 0000000..11fde20
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/CONTRIBUTING.md
@@ -0,0 +1,74 @@
+# Contributing to Anthropic-Cybersecurity-Skills
+
+## How to add a new skill
+
+1. Create a new directory: `skills/your-skill-name/`
+2. Add a `SKILL.md` file with required YAML frontmatter:
+ ```yaml
+ ---
+ name: your-skill-name
+ description: >-
+ Clear description of what this skill does and when
+ an AI agent should activate it. Include keywords.
+ domain: cybersecurity
+ subdomain: [category]
+ tags: [tag1, tag2, tag3]
+ version: "1.0"
+ author: your-github-username
+ license: Apache-2.0
+ ---
+ ```
+3. Write clear, step-by-step instructions in the Markdown body using these sections:
+ - ## When to Use
+ - ## Prerequisites
+ - ## Workflow (numbered steps with real commands)
+ - ## Key Concepts (table)
+ - ## Tools & Systems
+ - ## Common Scenarios
+ - ## Output Format
+4. (Optional) Add supporting files:
+ - `references/standards.md` — Real standard numbers, CVE refs, NIST/MITRE links
+ - `references/workflows.md` — Deep technical procedure
+ - `scripts/process.py` — Real working helper script
+ - `assets/template.md` — Real filled-in checklist/template
+5. Submit a PR with title: `Add skill: your-skill-name`
+
+## Skill quality checklist
+- [ ] Name is lowercase with hyphens (kebab-case), 1–64 characters
+- [ ] Description is clear and includes agent-discovery keywords
+- [ ] Instructions are actionable with real commands and tool names
+- [ ] Domain and subdomain are set correctly
+- [ ] Tags include relevant tools, frameworks, and techniques
+
+## Subdomains
+Choose the most appropriate subdomain for your skill:
+- web-application-security
+- network-security
+- penetration-testing
+- red-teaming
+- digital-forensics
+- malware-analysis
+- threat-intelligence
+- cloud-security
+- container-security
+- identity-access-management
+- cryptography
+- vulnerability-management
+- compliance-governance
+- zero-trust-architecture
+- ot-ics-security
+- devsecops
+- soc-operations
+- incident-response
+- phishing-defense
+- ransomware-defense
+- api-security
+- mobile-security
+- endpoint-security
+- threat-hunting
+
+## Code of Conduct
+This project follows the [Contributor Covenant](CODE_OF_CONDUCT.md). By participating, you agree to uphold this code.
+
+## License
+By contributing, you agree that your contributions will be licensed under Apache-2.0.
diff --git a/personas/_shared/anthropic-cybersecurity-skills/LICENSE b/personas/_shared/anthropic-cybersecurity-skills/LICENSE
new file mode 100644
index 0000000..d885118
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/LICENSE
@@ -0,0 +1,201 @@
+
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to the Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by the Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding any notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. Please do not remove or change
+ the license header comment from a contributed file except when
+ necessary.
+
+ Copyright 2026 mukul975
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
diff --git a/personas/_shared/anthropic-cybersecurity-skills/README.md b/personas/_shared/anthropic-cybersecurity-skills/README.md
new file mode 100644
index 0000000..ca75208
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/README.md
@@ -0,0 +1,358 @@
+
+
+---
+
+> ⚠️ **Community Project** — This is an independent, community-created project. Not affiliated with Anthropic PBC.
+
+## Give any AI agent the security skills of a senior analyst
+
+A junior analyst knows which Volatility3 plugin to run on a suspicious memory dump, which Sigma rules catch Kerberoasting, and how to scope a cloud breach across three providers. **Your AI agent doesn't — unless you give it these skills.**
+
+This repo contains **754 structured cybersecurity skills** spanning **26 security domains**, each following the [agentskills.io](https://agentskills.io) open standard. Every skill is mapped to **five industry frameworks** — MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, MITRE D3FEND, and NIST AI RMF — making this the only open-source skills library with unified cross-framework coverage. Clone it, point your agent at it, and your next security investigation gets expert-level guidance in seconds.
+
+## Five frameworks, one skill library
+
+No other open-source skills library maps every skill to all five frameworks. One skill, five compliance checkboxes.
+
+| Framework | Version | Scope in this repo | What it maps |
+|---|---|---|---|
+| [MITRE ATT&CK](https://attack.mitre.org) | v18 | 14 tactics · 200+ techniques | Adversary behaviors and TTPs |
+| [NIST CSF 2.0](https://www.nist.gov/cyberframework) | 2.0 | 6 functions · 22 categories | Organizational security posture |
+| [MITRE ATLAS](https://atlas.mitre.org) | v5.4 | 16 tactics · 84 techniques | AI/ML adversarial threats |
+| [MITRE D3FEND](https://d3fend.mitre.org) | v1.3 | 7 categories · 267 techniques | Defensive countermeasures |
+| [NIST AI RMF](https://airc.nist.gov/AI_RMF) | 1.0 | 4 functions · 72 subcategories | AI risk management |
+
+**Example — a single skill maps across all five:**
+
+| Skill | ATT&CK | NIST CSF | ATLAS | D3FEND | AI RMF |
+|---|---|---|---|---|---|
+| `analyzing-network-traffic-of-malware` | T1071 | DE.CM | AML.T0047 | D3-NTA | MEASURE-2.6 |
+
+## Quick start
+
+```bash
+# Option 1: npx (recommended)
+npx skills add mukul975/Anthropic-Cybersecurity-Skills
+
+# Option 2: Git clone
+git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.git
+cd Anthropic-Cybersecurity-Skills
+```
+
+Works immediately with Claude Code, GitHub Copilot, OpenAI Codex CLI, Cursor, Gemini CLI, and any [agentskills.io](https://agentskills.io)-compatible platform.
+
+## Why this exists
+
+The cybersecurity workforce gap hit **4.8 million unfilled roles** globally in 2024 (ISC2). AI agents can help close that gap — but only if they have structured domain knowledge to work from. Today's agents can write code and search the web, but they lack the practitioner playbooks that turn a generic LLM into a capable security analyst.
+
+Existing security tool repos give you wordlists, payloads, or exploit code. None of them give an AI agent the structured decision-making workflow a senior analyst follows: when to use each technique, what prerequisites to check, how to execute step-by-step, and how to verify results. That is the gap this project fills.
+
+**Anthropic Cybersecurity Skills** is not a collection of scripts or checklists. It is an **AI-native knowledge base** built from the ground up for the agentskills.io standard — YAML frontmatter for sub-second discovery, structured Markdown for step-by-step execution, and reference files for deep technical context. Every skill encodes real practitioner workflows, not generated summaries.
+
+## What's inside — 26 security domains
+
+| Domain | Skills | Key capabilities |
+|---|---|---|
+| Cloud Security | 60 | AWS, Azure, GCP hardening · CSPM · cloud forensics |
+| Threat Hunting | 55 | Hypothesis-driven hunts · LOTL detection · behavioral analytics |
+| Threat Intelligence | 50 | STIX/TAXII · MISP · feed integration · actor profiling |
+| Web Application Security | 42 | OWASP Top 10 · SQLi · XSS · SSRF · deserialization |
+| Network Security | 40 | IDS/IPS · firewall rules · VLAN segmentation · traffic analysis |
+| Malware Analysis | 39 | Static/dynamic analysis · reverse engineering · sandboxing |
+| Digital Forensics | 37 | Disk imaging · memory forensics · timeline reconstruction |
+| Security Operations | 36 | SIEM correlation · log analysis · alert triage |
+| Identity & Access Management | 35 | IAM policies · PAM · zero trust identity · Okta · SailPoint |
+| SOC Operations | 33 | Playbooks · escalation workflows · metrics · tabletop exercises |
+| Container Security | 30 | K8s RBAC · image scanning · Falco · container forensics |
+| OT/ICS Security | 28 | Modbus · DNP3 · IEC 62443 · historian defense · SCADA |
+| API Security | 28 | GraphQL · REST · OWASP API Top 10 · WAF bypass |
+| Vulnerability Management | 25 | Nessus · scanning workflows · patch prioritization · CVSS |
+| Incident Response | 25 | Breach containment · ransomware response · IR playbooks |
+| Red Teaming | 24 | Full-scope engagements · AD attacks · phishing simulation |
+| Penetration Testing | 23 | Network · web · cloud · mobile · wireless pentesting |
+| Endpoint Security | 17 | EDR · LOTL detection · fileless malware · persistence hunting |
+| DevSecOps | 17 | CI/CD security · code signing · Terraform auditing |
+| Phishing Defense | 16 | Email authentication · BEC detection · phishing IR |
+| Cryptography | 14 | TLS · Ed25519 · certificate transparency · key management |
+| Zero Trust Architecture | 13 | BeyondCorp · CISA maturity model · microsegmentation |
+| Mobile Security | 12 | Android/iOS analysis · mobile pentesting · MDM forensics |
+| Ransomware Defense | 7 | Precursor detection · response · recovery · encryption analysis |
+| Compliance & Governance | 5 | CIS benchmarks · SOC 2 · regulatory frameworks |
+| Deception Technology | 2 | Honeytokens · breach detection canaries |
+
+## How AI agents use these skills
+
+Each skill costs **~30 tokens to scan** (frontmatter only) and **500–2,000 tokens to fully load** (complete workflow). This progressive disclosure architecture lets agents search all 754 skills in a single pass without blowing context windows.
+
+```
+User prompt: "Analyze this memory dump for signs of credential theft"
+
+Agent's internal process:
+
+ 1. Scans 754 skill frontmatters (~30 tokens each)
+ → identifies 12 relevant skills by matching tags, description, domain
+
+ 2. Loads top 3 matches:
+ • performing-memory-forensics-with-volatility3
+ • hunting-for-credential-dumping-lsass
+ • analyzing-windows-event-logs-for-credential-access
+
+ 3. Executes the structured Workflow section step-by-step
+ → runs Volatility3 plugins, checks LSASS access patterns,
+ correlates with event log evidence
+
+ 4. Validates results using the Verification section
+ → confirms IOCs, maps findings to ATT&CK T1003 (Credential Dumping)
+```
+
+**Without these skills**, the agent guesses at tool commands and misses critical steps. **With them**, it follows the same playbook a senior DFIR analyst would use.
+
+## Skill anatomy
+
+Every skill follows a consistent directory structure:
+
+```
+skills/performing-memory-forensics-with-volatility3/
+├── SKILL.md ← Skill definition (YAML frontmatter + Markdown body)
+├── references/
+│ ├── standards.md ← MITRE ATT&CK, ATLAS, D3FEND, NIST mappings
+│ └── workflows.md ← Deep technical procedure reference
+├── scripts/
+│ └── process.py ← Working helper scripts
+└── assets/
+ └── template.md ← Filled-in checklists and report templates
+```
+
+
+### YAML frontmatter (real example)
+
+```yaml
+---
+name: performing-memory-forensics-with-volatility3
+description: >-
+ Analyze memory dumps to extract running processes, network connections,
+ injected code, and malware artifacts using the Volatility3 framework.
+domain: cybersecurity
+subdomain: digital-forensics
+tags: [forensics, memory-analysis, volatility3, incident-response, dfir]
+atlas_techniques: [AML.T0047]
+d3fend_techniques: [D3-MA, D3-PSMD]
+nist_ai_rmf: [MEASURE-2.6]
+nist_csf: [DE.CM-01, RS.AN-03]
+version: "1.2"
+author: mukul975
+license: Apache-2.0
+---
+```
+
+
+### Markdown body sections
+
+```markdown
+## When to Use
+Trigger conditions — when should an AI agent activate this skill?
+
+## Prerequisites
+Required tools, access levels, and environment setup.
+
+## Workflow
+Step-by-step execution guide with specific commands and decision points.
+
+## Verification
+How to confirm the skill was executed successfully.
+```
+
+Frontmatter fields: `name` (kebab-case, 1–64 chars), `description` (keyword-rich for agent discovery), `domain`, `subdomain`, `tags`, `atlas_techniques` (MITRE ATLAS IDs), `d3fend_techniques` (MITRE D3FEND IDs), `nist_ai_rmf` (NIST AI RMF references), `nist_csf` (NIST CSF 2.0 categories). MITRE ATT&CK technique mappings are documented in each skill's `references/standards.md` file and in the ATT&CK Navigator layer included with releases.
+
+
+📊 MITRE ATT&CK Enterprise coverage — all 14 tactics
+
+
+
+| Tactic | ID | Coverage | Key skills |
+|---|---|---|---|
+| Reconnaissance | TA0043 | Strong | OSINT, subdomain enumeration, DNS recon |
+| Resource Development | TA0042 | Moderate | Phishing infrastructure, C2 setup detection |
+| Initial Access | TA0001 | Strong | Phishing simulation, exploit detection, forced browsing |
+| Execution | TA0002 | Strong | PowerShell analysis, fileless malware, script block logging |
+| Persistence | TA0003 | Strong | Scheduled tasks, registry, service accounts, LOTL |
+| Privilege Escalation | TA0004 | Strong | Kerberoasting, AD attacks, cloud privilege escalation |
+| Defense Evasion | TA0005 | Strong | Obfuscation, rootkit analysis, evasion detection |
+| Credential Access | TA0006 | Strong | Mimikatz detection, pass-the-hash, credential dumping |
+| Discovery | TA0007 | Moderate | BloodHound, AD enumeration, network scanning |
+| Lateral Movement | TA0008 | Strong | SMB exploits, lateral movement detection with Splunk |
+| Collection | TA0009 | Moderate | Email forensics, data staging detection |
+| Command and Control | TA0011 | Strong | C2 beaconing, DNS tunneling, Cobalt Strike analysis |
+| Exfiltration | TA0010 | Strong | DNS exfiltration, DLP controls, data loss detection |
+| Impact | TA0040 | Strong | Ransomware defense, encryption analysis, recovery |
+
+An **ATT&CK Navigator layer file** is included in the [v1.0.0 release assets](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/releases/tag/v1.0.0) for visual coverage mapping.
+
+> **Note:** ATT&CK v19 lands April 28, 2026 — splitting Defense Evasion (TA0005) into two new tactics: *Stealth* and *Impair Defenses*. Skill mappings will be updated in a forthcoming release.
+
+
+
+
+📊 NIST CSF 2.0 alignment — all 6 functions
+
+
+
+| Function | Skills | Examples |
+|---|---|---|
+| **Govern (GV)** | 30+ | Risk strategy, policy frameworks, roles & responsibilities |
+| **Identify (ID)** | 120+ | Asset discovery, threat landscape assessment, risk analysis |
+| **Protect (PR)** | 150+ | IAM hardening, WAF rules, zero trust, encryption |
+| **Detect (DE)** | 200+ | Threat hunting, SIEM correlation, anomaly detection |
+| **Respond (RS)** | 160+ | Incident response, forensics, breach containment |
+| **Recover (RC)** | 40+ | Ransomware recovery, BCP, disaster recovery |
+
+NIST CSF 2.0 (February 2024) added the **Govern** function and expanded scope from critical infrastructure to all organizations. Skill mappings align to all 22 categories and reference 106 subcategories.
+
+
+
+
+📊 Framework deep dive — ATLAS, D3FEND, AI RMF
+
+
+
+### MITRE ATLAS v5.4 — AI/ML adversarial threats
+ATLAS maps adversarial tactics, techniques, and case studies specific to AI and machine learning systems. Version 5.4 covers **16 tactics and 84 techniques** including agentic AI attack vectors added in late 2025: AI agent context poisoning, tool invocation abuse, MCP server compromises, and malicious agent deployment. Skills mapped to ATLAS help agents identify and defend against threats to ML pipelines, model weights, inference APIs, and autonomous workflows.
+
+### MITRE D3FEND v1.3 — Defensive countermeasures
+D3FEND is an NSA-funded knowledge graph of **267 defensive techniques** organized across 7 tactical categories: Model, Harden, Detect, Isolate, Deceive, Evict, and Restore. Built on OWL 2 ontology, it uses a shared Digital Artifact layer to bidirectionally map defensive countermeasures to ATT&CK offensive techniques. Skills tagged with D3FEND identifiers let agents recommend specific countermeasures for detected threats.
+
+### NIST AI RMF 1.0 + GenAI Profile (AI 600-1)
+The AI Risk Management Framework defines 4 core functions — Govern, Map, Measure, Manage — with **72 subcategories** for trustworthy AI development. The GenAI Profile (AI 600-1, July 2024) adds **12 risk categories** specific to generative AI, from confabulation and data privacy to prompt injection and supply chain risks. Colorado's AI Act (effective February 2026) provides a **legal safe harbor** for organizations complying with NIST AI RMF, making these mappings directly relevant to regulatory compliance.
+
+
+
+## Compatible platforms
+
+**AI code assistants**
+Claude Code (Anthropic) · GitHub Copilot (Microsoft) · Cursor · Windsurf · Cline · Aider · Continue · Roo Code · Amazon Q Developer · Tabnine · Sourcegraph Cody · JetBrains AI
+
+**CLI agents**
+OpenAI Codex CLI · Gemini CLI (Google)
+
+**Autonomous agents**
+Devin · Replit Agent · SWE-agent · OpenHands
+
+**Agent frameworks & SDKs**
+LangChain · CrewAI · AutoGen · Semantic Kernel · Haystack · Vercel AI SDK · Any MCP-compatible agent
+
+All platforms that support the [agentskills.io](https://agentskills.io) standard can load these skills with zero configuration.
+
+## What people are saying
+
+> *"A database of real, organized security skills that any AI agent can plug into and use. Not tutorials. Not blog posts."*
+> — **[Hasan Toor (@hasantoxr)](https://x.com/hasantoxr/status/2033193922349179249)**, AI/tech creator
+
+> *"This is not a random collection of security scripts. It's a structured operational knowledge base designed for AI-driven security workflows."*
+> — **[fazal-sec](https://fazal-sec.medium.com/claude-skills-ai-powered-cybersecurity-the-complete-guide-to-building-intelligent-security-7bb7e9d14c8e)**, Medium
+
+## Featured in
+
+| Where | Type | Link |
+|---|---|---|
+| **awesome-agent-skills** | Awesome List (1,000+ skills index) | [VoltAgent/awesome-agent-skills](https://github.com/VoltAgent/awesome-agent-skills) |
+| **awesome-ai-security** | Awesome List (AI security tools) | [ottosulin/awesome-ai-security](https://github.com/ottosulin/awesome-ai-security) |
+| **awesome-codex-cli** | Awesome List (Codex CLI resources) | [RoggeOhta/awesome-codex-cli](https://github.com/RoggeOhta/awesome-codex-cli) |
+| **SkillsLLM** | Skills directory & marketplace | [skillsllm.com/skill/anthropic-cybersecurity-skills](https://skillsllm.com/skill/anthropic-cybersecurity-skills) |
+| **Openflows** | Signal analysis & tracking | [openflows.org](https://openflows.org/currency/currents/anthropic-cybersecurity-skills/) |
+| **NeverSight skills_feed** | Automated skills index | [NeverSight/skills_feed](https://github.com/NeverSight/skills_feed) |
+
+## Star history
+
+
+
+
+
+
+
+
+
+## Releases
+
+| Version | Date | Highlights |
+|---|---|---|
+| [v1.0.0](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/releases/tag/v1.0.0) | March 11, 2026 | 734 skills · 26 domains · MITRE ATT&CK + NIST CSF 2.0 mapping · ATT&CK Navigator layer |
+
+Skills have continued to grow on `main` since v1.0.0 — the library now contains **754 skills** with **5-framework mapping** (MITRE ATLAS, D3FEND, and NIST AI RMF added post-release). Check [Releases](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/releases) for the latest tagged version.
+
+## Contributing
+
+This project grows through community contributions. Here is how to get involved:
+
+**Add a new skill** — Domains like Deception Technology (2 skills) and Compliance & Governance (5 skills) need the most help. Follow the template in [CONTRIBUTING.md](CONTRIBUTING.md) and submit a PR with the title `Add skill: your-skill-name`.
+
+**Improve existing skills** — Add framework mappings, fix workflows, update tool references, or contribute scripts and templates.
+
+**Report issues** — Found an inaccurate procedure or broken script? [Open an issue](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/issues).
+
+Every PR is reviewed for technical accuracy and agentskills.io standard compliance within 48 hours. Check [good first issues](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/issues?q=is%3Aissue+is%3Aopen+label%3A%22good+first+issue%22) for a starting point.
+
+This project follows the [Contributor Covenant](https://www.contributor-covenant.org/). By participating, you agree to uphold this code.
+
+## Community
+
+💬 [Discussions](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/discussions) — Questions, ideas, and roadmap conversations
+🐛 [Issues](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/issues) — Bug reports and feature requests
+🔒 [Security Policy](SECURITY.md) — Responsible disclosure process (48-hour acknowledgment)
+
+## Citation
+
+If you use this project in research or publications:
+
+```bibtex
+@software{anthropic_cybersecurity_skills,
+ author = {Jangra, Mahipal},
+ title = {Anthropic Cybersecurity Skills},
+ year = {2026},
+ url = {https://github.com/mukul975/Anthropic-Cybersecurity-Skills},
+ license = {Apache-2.0},
+ note = {754 structured cybersecurity skills for AI agents,
+ mapped to MITRE ATT\&CK, NIST CSF 2.0, MITRE ATLAS,
+ MITRE D3FEND, and NIST AI RMF}
+}
+```
+
+## License
+
+This project is licensed under the [Apache License 2.0](LICENSE). You are free to use, modify, and distribute these skills in both personal and commercial projects.
+
+---
+
+
+
+**If this project helps your security work, consider giving it a ⭐**
+
+[⭐ Star](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/stargazers) · [🍴 Fork](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/fork) · [💬 Discuss](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/discussions) · [📝 Contribute](CONTRIBUTING.md)
+
+Community project by [@mukul975](https://github.com/mukul975). Not affiliated with Anthropic PBC.
+
+
diff --git a/personas/_shared/anthropic-cybersecurity-skills/SECURITY.md b/personas/_shared/anthropic-cybersecurity-skills/SECURITY.md
new file mode 100644
index 0000000..e845925
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/SECURITY.md
@@ -0,0 +1,47 @@
+# Security Policy
+
+## Supported Versions
+
+All skill content in this repository is covered by this security policy.
+
+| Component | Supported |
+|-----------|-----------|
+| Skill definitions (SKILL.md files) | Yes |
+| Scripts and automation | Yes |
+| Documentation | Yes |
+
+## Reporting a Vulnerability
+
+If you discover a security issue with any skill's scripts, instructions, or content, please report it responsibly:
+
+1. **Do not** open a public issue
+2. Use GitHub's private security advisory: [Report a vulnerability](https://github.com/mukul975/Anthropic-Cybersecurity-Skills/security/advisories/new)
+3. Include in your report:
+ - Affected skill name and file path
+ - Nature of the vulnerability
+ - Potential impact
+ - Steps to reproduce (if applicable)
+ - Suggested fix (if you have one)
+
+## Response Timeline
+
+- **Initial acknowledgment:** Within 48 hours
+- **Assessment and triage:** Within 1 week
+- **Fix or mitigation:** Based on severity, typically within 2 weeks
+
+## Scope
+
+The following are in scope for security reports:
+
+- Skills that contain commands or scripts that could cause unintended harm
+- Instructions that could lead to unauthorized access if followed incorrectly
+- Sensitive data accidentally included in skill content
+- Dependencies or external references that have become compromised
+
+## Recognition
+
+We credit responsible disclosures in our changelog. If you report a valid security issue, we will acknowledge your contribution unless you prefer to remain anonymous.
+
+## Contact
+
+For security matters that cannot be reported through GitHub's advisory system, reach out via the repository's discussion forum.
diff --git a/personas/_shared/anthropic-cybersecurity-skills/assets/.gitkeep b/personas/_shared/anthropic-cybersecurity-skills/assets/.gitkeep
new file mode 100644
index 0000000..e69de29
diff --git a/personas/_shared/anthropic-cybersecurity-skills/assets/banner.png b/personas/_shared/anthropic-cybersecurity-skills/assets/banner.png
new file mode 100644
index 0000000..8697e71
Binary files /dev/null and b/personas/_shared/anthropic-cybersecurity-skills/assets/banner.png differ
diff --git a/personas/_shared/anthropic-cybersecurity-skills/index.json b/personas/_shared/anthropic-cybersecurity-skills/index.json
new file mode 100644
index 0000000..5175d16
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/index.json
@@ -0,0 +1 @@
+{"version":"1.1.0","generated_at":"2026-04-06T09:17:51Z","repository":"https://github.com/mukul975/Anthropic-Cybersecurity-Skills","domain":"cybersecurity","total_skills":754,"skills":[{"name":"acquiring-disk-image-with-dd-and-dcfldd","description":"Create forensically sound bit-for-bit disk images using dd and dcfldd while preserving evidence integrity through","domain":"cybersecurity","path":"skills/acquiring-disk-image-with-dd-and-dcfldd"},{"name":"analyzing-active-directory-acl-abuse","description":"Detect dangerous ACL misconfigurations in Active Directory using ldap3 to identify GenericAll, WriteDACL, and","domain":"cybersecurity","path":"skills/analyzing-active-directory-acl-abuse"},{"name":"analyzing-android-malware-with-apktool","description":"Perform static analysis of Android APK malware samples using apktool for decompilation, jadx for Java source","domain":"cybersecurity","path":"skills/analyzing-android-malware-with-apktool"},{"name":"analyzing-api-gateway-access-logs","description":"'Parses API Gateway access logs (AWS API Gateway, Kong, Nginx) to detect BOLA/IDOR attacks, rate limit bypass,","domain":"cybersecurity","path":"skills/analyzing-api-gateway-access-logs"},{"name":"analyzing-apt-group-with-mitre-navigator","description":"Analyze advanced persistent threat (APT) group techniques using MITRE ATT&CK Navigator to create layered heatmaps","domain":"cybersecurity","path":"skills/analyzing-apt-group-with-mitre-navigator"},{"name":"analyzing-azure-activity-logs-for-threats","description":"'Queries Azure Monitor activity logs and sign-in logs via azure-monitor-query to detect suspicious administrative","domain":"cybersecurity","path":"skills/analyzing-azure-activity-logs-for-threats"},{"name":"analyzing-bootkit-and-rootkit-samples","description":"'Analyzes bootkit and advanced rootkit malware that infects the Master Boot Record (MBR), Volume Boot Record","domain":"cybersecurity","path":"skills/analyzing-bootkit-and-rootkit-samples"},{"name":"analyzing-browser-forensics-with-hindsight","description":"Analyze Chromium-based browser artifacts using Hindsight to extract browsing history, downloads, cookies, cached","domain":"cybersecurity","path":"skills/analyzing-browser-forensics-with-hindsight"},{"name":"analyzing-campaign-attribution-evidence","description":"Campaign attribution analysis involves systematically evaluating evidence to determine which threat actor or","domain":"cybersecurity","path":"skills/analyzing-campaign-attribution-evidence"},{"name":"analyzing-certificate-transparency-for-phishing","description":"Monitor Certificate Transparency logs using crt.sh and Certstream to detect phishing domains, lookalike certificates,","domain":"cybersecurity","path":"skills/analyzing-certificate-transparency-for-phishing"},{"name":"analyzing-cloud-storage-access-patterns","description":"Detect abnormal access patterns in AWS S3, GCS, and Azure Blob Storage by analyzing CloudTrail Data Events, GCS","domain":"cybersecurity","path":"skills/analyzing-cloud-storage-access-patterns"},{"name":"analyzing-cobalt-strike-beacon-configuration","description":"Extract and analyze Cobalt Strike beacon configuration from PE files and memory dumps to identify C2 infrastructure,","domain":"cybersecurity","path":"skills/analyzing-cobalt-strike-beacon-configuration"},{"name":"analyzing-cobaltstrike-malleable-c2-profiles","description":"Parse and analyze Cobalt Strike Malleable C2 profiles using dissect.cobaltstrike and pyMalleableC2 to extract","domain":"cybersecurity","path":"skills/analyzing-cobaltstrike-malleable-c2-profiles"},{"name":"analyzing-command-and-control-communication","description":"'Analyzes malware command-and-control (C2) communication protocols to understand beacon patterns, command structures,","domain":"cybersecurity","path":"skills/analyzing-command-and-control-communication"},{"name":"analyzing-cyber-kill-chain","description":"'Analyzes intrusion activity against the Lockheed Martin Cyber Kill Chain framework to identify which phases","domain":"cybersecurity","path":"skills/analyzing-cyber-kill-chain"},{"name":"analyzing-disk-image-with-autopsy","description":"Perform comprehensive forensic analysis of disk images using Autopsy to recover files, examine artifacts, and","domain":"cybersecurity","path":"skills/analyzing-disk-image-with-autopsy"},{"name":"analyzing-dns-logs-for-exfiltration","description":"'Analyzes DNS query logs to detect data exfiltration via DNS tunneling, DGA domain communication, and covert","domain":"cybersecurity","path":"skills/analyzing-dns-logs-for-exfiltration"},{"name":"analyzing-docker-container-forensics","description":"Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to","domain":"cybersecurity","path":"skills/analyzing-docker-container-forensics"},{"name":"analyzing-email-headers-for-phishing-investigation","description":"Parse and analyze email headers to trace the origin of phishing emails, verify sender authenticity, and identify","domain":"cybersecurity","path":"skills/analyzing-email-headers-for-phishing-investigation"},{"name":"analyzing-ethereum-smart-contract-vulnerabilities","description":"Perform static and symbolic analysis of Solidity smart contracts using Slither and Mythril to detect reentrancy,","domain":"cybersecurity","path":"skills/analyzing-ethereum-smart-contract-vulnerabilities"},{"name":"analyzing-golang-malware-with-ghidra","description":"Reverse engineer Go-compiled malware using Ghidra with specialized scripts for function recovery, string extraction,","domain":"cybersecurity","path":"skills/analyzing-golang-malware-with-ghidra"},{"name":"analyzing-heap-spray-exploitation","description":"Detect and analyze heap spray attacks in memory dumps using Volatility3 plugins to identify NOP sled patterns,","domain":"cybersecurity","path":"skills/analyzing-heap-spray-exploitation"},{"name":"analyzing-indicators-of-compromise","description":"'Analyzes indicators of compromise (IOCs) including IP addresses, domains, file hashes, URLs, and email artifacts","domain":"cybersecurity","path":"skills/analyzing-indicators-of-compromise"},{"name":"analyzing-ios-app-security-with-objection","description":"'Performs runtime mobile security exploration of iOS applications using Objection, a Frida-powered toolkit that","domain":"cybersecurity","path":"skills/analyzing-ios-app-security-with-objection"},{"name":"analyzing-kubernetes-audit-logs","description":"'Parses Kubernetes API server audit logs (JSON lines) to detect exec-into-pod, secret access, RBAC modifications,","domain":"cybersecurity","path":"skills/analyzing-kubernetes-audit-logs"},{"name":"analyzing-linux-audit-logs-for-intrusion","description":"'Uses the Linux Audit framework (auditd) with ausearch and aureport utilities to detect intrusion attempts, unauthorized","domain":"cybersecurity","path":"skills/analyzing-linux-audit-logs-for-intrusion"},{"name":"analyzing-linux-elf-malware","description":"'Analyzes malicious Linux ELF (Executable and Linkable Format) binaries including botnets, cryptominers, ransomware,","domain":"cybersecurity","path":"skills/analyzing-linux-elf-malware"},{"name":"analyzing-linux-kernel-rootkits","description":"Detect kernel-level rootkits in Linux memory dumps using Volatility3 linux plugins (check_syscall, lsmod, hidden_modules),","domain":"cybersecurity","path":"skills/analyzing-linux-kernel-rootkits"},{"name":"analyzing-linux-system-artifacts","description":"Examine Linux system artifacts including auth logs, cron jobs, shell history, and system configuration to uncover","domain":"cybersecurity","path":"skills/analyzing-linux-system-artifacts"},{"name":"analyzing-lnk-file-and-jump-list-artifacts","description":"Analyze Windows LNK shortcut files and Jump List artifacts to establish evidence of file access, program execution,","domain":"cybersecurity","path":"skills/analyzing-lnk-file-and-jump-list-artifacts"},{"name":"analyzing-macro-malware-in-office-documents","description":"'Analyzes malicious VBA macros embedded in Microsoft Office documents (Word, Excel, PowerPoint) to identify download","domain":"cybersecurity","path":"skills/analyzing-macro-malware-in-office-documents"},{"name":"analyzing-malicious-pdf-with-peepdf","description":"Perform static analysis of malicious PDF documents using peepdf, pdfid, and pdf-parser to extract embedded JavaScript,","domain":"cybersecurity","path":"skills/analyzing-malicious-pdf-with-peepdf"},{"name":"analyzing-malicious-url-with-urlscan","description":"URLScan.io is a free service for scanning and analyzing suspicious URLs. It captures screenshots, DOM content,","domain":"cybersecurity","path":"skills/analyzing-malicious-url-with-urlscan"},{"name":"analyzing-malware-behavior-with-cuckoo-sandbox","description":"'Executes malware samples in Cuckoo Sandbox to observe runtime behavior including process creation, file system","domain":"cybersecurity","path":"skills/analyzing-malware-behavior-with-cuckoo-sandbox"},{"name":"analyzing-malware-family-relationships-with-malpedia","description":"Use the Malpedia platform and API to research malware family relationships, track variant evolution, link families","domain":"cybersecurity","path":"skills/analyzing-malware-family-relationships-with-malpedia"},{"name":"analyzing-malware-persistence-with-autoruns","description":"Use Sysinternals Autoruns to systematically identify and analyze malware persistence mechanisms across registry","domain":"cybersecurity","path":"skills/analyzing-malware-persistence-with-autoruns"},{"name":"analyzing-malware-sandbox-evasion-techniques","description":"Detect sandbox evasion techniques in malware samples by analyzing timing checks, VM artifact queries, user interaction","domain":"cybersecurity","path":"skills/analyzing-malware-sandbox-evasion-techniques"},{"name":"analyzing-memory-dumps-with-volatility","description":"'Analyzes RAM memory dumps from compromised systems using the Volatility framework to identify malicious processes,","domain":"cybersecurity","path":"skills/analyzing-memory-dumps-with-volatility"},{"name":"analyzing-memory-forensics-with-lime-and-volatility","description":"'Performs Linux memory acquisition using LiME (Linux Memory Extractor) kernel module and analysis with Volatility","domain":"cybersecurity","path":"skills/analyzing-memory-forensics-with-lime-and-volatility"},{"name":"analyzing-mft-for-deleted-file-recovery","description":"Analyze the NTFS Master File Table ($MFT) to recover metadata and content of deleted files by examining MFT record","domain":"cybersecurity","path":"skills/analyzing-mft-for-deleted-file-recovery"},{"name":"analyzing-network-covert-channels-in-malware","description":"Detect and analyze covert communication channels used by malware including DNS tunneling, ICMP exfiltration,","domain":"cybersecurity","path":"skills/analyzing-network-covert-channels-in-malware"},{"name":"analyzing-network-flow-data-with-netflow","description":"Parse NetFlow v9 and IPFIX records to detect volumetric anomalies, port scanning, data exfiltration, and C2 beaconing","domain":"cybersecurity","path":"skills/analyzing-network-flow-data-with-netflow"},{"name":"analyzing-network-packets-with-scapy","description":"Craft, send, sniff, and dissect network packets using Scapy for protocol analysis, network reconnaissance, and","domain":"cybersecurity","path":"skills/analyzing-network-packets-with-scapy"},{"name":"analyzing-network-traffic-for-incidents","description":"'Analyzes network traffic captures and flow data to identify adversary activity during security incidents, including","domain":"cybersecurity","path":"skills/analyzing-network-traffic-for-incidents"},{"name":"analyzing-network-traffic-of-malware","description":"'Analyzes network traffic generated by malware during sandbox execution or live incident response to identify","domain":"cybersecurity","path":"skills/analyzing-network-traffic-of-malware"},{"name":"analyzing-network-traffic-with-wireshark","description":"'Captures and analyzes network packet data using Wireshark and tshark to identify malicious traffic patterns,","domain":"cybersecurity","path":"skills/analyzing-network-traffic-with-wireshark"},{"name":"analyzing-office365-audit-logs-for-compromise","description":"Parse Office 365 Unified Audit Logs via Microsoft Graph API to detect email forwarding rule creation, inbox delegation,","domain":"cybersecurity","path":"skills/analyzing-office365-audit-logs-for-compromise"},{"name":"analyzing-outlook-pst-for-email-forensics","description":"Analyze Microsoft Outlook PST and OST files for email forensic evidence including message content, headers, attachments,","domain":"cybersecurity","path":"skills/analyzing-outlook-pst-for-email-forensics"},{"name":"analyzing-packed-malware-with-upx-unpacker","description":"'Identifies and unpacks UPX-packed and other packed malware samples to expose the original executable code for","domain":"cybersecurity","path":"skills/analyzing-packed-malware-with-upx-unpacker"},{"name":"analyzing-pdf-malware-with-pdfid","description":"'Analyzes malicious PDF files using PDFiD, pdf-parser, and peepdf to identify embedded JavaScript, shellcode,","domain":"cybersecurity","path":"skills/analyzing-pdf-malware-with-pdfid"},{"name":"analyzing-persistence-mechanisms-in-linux","description":"Detect and analyze Linux persistence mechanisms including crontab entries, systemd service units, LD_PRELOAD","domain":"cybersecurity","path":"skills/analyzing-persistence-mechanisms-in-linux"},{"name":"analyzing-powershell-empire-artifacts","description":"Detect PowerShell Empire framework artifacts in Windows event logs by identifying Base64 encoded launcher patterns,","domain":"cybersecurity","path":"skills/analyzing-powershell-empire-artifacts"},{"name":"analyzing-powershell-script-block-logging","description":"Parse Windows PowerShell Script Block Logs (Event ID 4104) from EVTX files to detect obfuscated commands, encoded","domain":"cybersecurity","path":"skills/analyzing-powershell-script-block-logging"},{"name":"analyzing-prefetch-files-for-execution-history","description":"Parse Windows Prefetch files to determine program execution history including run counts, timestamps, and referenced","domain":"cybersecurity","path":"skills/analyzing-prefetch-files-for-execution-history"},{"name":"analyzing-ransomware-encryption-mechanisms","description":"'Analyzes encryption algorithms, key management, and file encryption routines used by ransomware families to","domain":"cybersecurity","path":"skills/analyzing-ransomware-encryption-mechanisms"},{"name":"analyzing-ransomware-leak-site-intelligence","description":"Monitor and analyze ransomware group data leak sites (DLS) to track victim postings, extract threat intelligence","domain":"cybersecurity","path":"skills/analyzing-ransomware-leak-site-intelligence"},{"name":"analyzing-ransomware-network-indicators","description":"Identify ransomware network indicators including C2 beaconing patterns, TOR exit node connections, data exfiltration","domain":"cybersecurity","path":"skills/analyzing-ransomware-network-indicators"},{"name":"analyzing-ransomware-payment-wallets","description":"'Traces ransomware cryptocurrency payment flows using blockchain analysis tools such as Chainalysis Reactor,","domain":"cybersecurity","path":"skills/analyzing-ransomware-payment-wallets"},{"name":"analyzing-sbom-for-supply-chain-vulnerabilities","description":"'Parses Software Bill of Materials (SBOM) in CycloneDX and SPDX JSON formats to identify supply chain vulnerabilities","domain":"cybersecurity","path":"skills/analyzing-sbom-for-supply-chain-vulnerabilities"},{"name":"analyzing-security-logs-with-splunk","description":"'Leverages Splunk Enterprise Security and SPL (Search Processing Language) to investigate security incidents","domain":"cybersecurity","path":"skills/analyzing-security-logs-with-splunk"},{"name":"analyzing-slack-space-and-file-system-artifacts","description":"Examine file system slack space, MFT entries, USN journal, and alternate data streams to recover hidden data","domain":"cybersecurity","path":"skills/analyzing-slack-space-and-file-system-artifacts"},{"name":"analyzing-supply-chain-malware-artifacts","description":"Investigate supply chain attack artifacts including trojanized software updates, compromised build pipelines,","domain":"cybersecurity","path":"skills/analyzing-supply-chain-malware-artifacts"},{"name":"analyzing-threat-actor-ttps-with-mitre-attack","description":"MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, techniques, and procedures (TTPs)","domain":"cybersecurity","path":"skills/analyzing-threat-actor-ttps-with-mitre-attack"},{"name":"analyzing-threat-actor-ttps-with-mitre-navigator","description":"'Map advanced persistent threat (APT) group tactics, techniques, and procedures (TTPs) to the MITRE ATT&CK framework","domain":"cybersecurity","path":"skills/analyzing-threat-actor-ttps-with-mitre-navigator"},{"name":"analyzing-threat-intelligence-feeds","description":"'Analyzes structured and unstructured threat intelligence feeds to extract actionable indicators, adversary tactics,","domain":"cybersecurity","path":"skills/analyzing-threat-intelligence-feeds"},{"name":"analyzing-threat-landscape-with-misp","description":"Analyze the threat landscape using MISP (Malware Information Sharing Platform) by querying event statistics,","domain":"cybersecurity","path":"skills/analyzing-threat-landscape-with-misp"},{"name":"analyzing-tls-certificate-transparency-logs","description":"'Queries Certificate Transparency logs via crt.sh and pycrtsh to detect phishing domains, unauthorized certificate","domain":"cybersecurity","path":"skills/analyzing-tls-certificate-transparency-logs"},{"name":"analyzing-typosquatting-domains-with-dnstwist","description":"Detect typosquatting, homograph phishing, and brand impersonation domains using dnstwist to generate domain permutations","domain":"cybersecurity","path":"skills/analyzing-typosquatting-domains-with-dnstwist"},{"name":"analyzing-uefi-bootkit-persistence","description":"'Analyzes UEFI bootkit persistence mechanisms including firmware implants in SPI flash, EFI System Partition","domain":"cybersecurity","path":"skills/analyzing-uefi-bootkit-persistence"},{"name":"analyzing-usb-device-connection-history","description":"Investigate USB device connection history from Windows registry, event logs, and setupapi logs to track removable","domain":"cybersecurity","path":"skills/analyzing-usb-device-connection-history"},{"name":"analyzing-web-server-logs-for-intrusion","description":"Parse Apache and Nginx access logs to detect SQL injection attempts, local file inclusion, directory traversal,","domain":"cybersecurity","path":"skills/analyzing-web-server-logs-for-intrusion"},{"name":"analyzing-windows-amcache-artifacts","description":"'Parses and analyzes the Windows Amcache.hve registry hive to extract evidence of program execution, application","domain":"cybersecurity","path":"skills/analyzing-windows-amcache-artifacts"},{"name":"analyzing-windows-event-logs-in-splunk","description":"'Analyzes Windows Security, System, and Sysmon event logs in Splunk to detect authentication attacks, privilege","domain":"cybersecurity","path":"skills/analyzing-windows-event-logs-in-splunk"},{"name":"analyzing-windows-lnk-files-for-artifacts","description":"Parse Windows LNK shortcut files to extract target paths, timestamps, volume information, and machine identifiers","domain":"cybersecurity","path":"skills/analyzing-windows-lnk-files-for-artifacts"},{"name":"analyzing-windows-prefetch-with-python","description":"Parse Windows Prefetch files using the windowsprefetch Python library to reconstruct application execution history,","domain":"cybersecurity","path":"skills/analyzing-windows-prefetch-with-python"},{"name":"analyzing-windows-registry-for-artifacts","description":"Extract and analyze Windows Registry hives to uncover user activity, installed software, autostart entries, and","domain":"cybersecurity","path":"skills/analyzing-windows-registry-for-artifacts"},{"name":"analyzing-windows-shellbag-artifacts","description":"Analyze Windows Shellbag registry artifacts to reconstruct folder browsing activity, detect access to removable","domain":"cybersecurity","path":"skills/analyzing-windows-shellbag-artifacts"},{"name":"auditing-aws-s3-bucket-permissions","description":"'Systematically audit AWS S3 bucket permissions to identify publicly accessible buckets, overly permissive ACLs,","domain":"cybersecurity","path":"skills/auditing-aws-s3-bucket-permissions"},{"name":"auditing-azure-active-directory-configuration","description":"'Auditing Microsoft Entra ID (Azure Active Directory) configuration to identify risky authentication policies,","domain":"cybersecurity","path":"skills/auditing-azure-active-directory-configuration"},{"name":"auditing-cloud-with-cis-benchmarks","description":"'This skill details how to conduct cloud security audits using Center for Internet Security benchmarks for AWS,","domain":"cybersecurity","path":"skills/auditing-cloud-with-cis-benchmarks"},{"name":"auditing-gcp-iam-permissions","description":"'Auditing Google Cloud Platform IAM permissions to identify overly permissive bindings, primitive role usage,","domain":"cybersecurity","path":"skills/auditing-gcp-iam-permissions"},{"name":"auditing-kubernetes-cluster-rbac","description":"'Auditing Kubernetes cluster RBAC configurations to identify overly permissive roles, wildcard permissions, dangerous","domain":"cybersecurity","path":"skills/auditing-kubernetes-cluster-rbac"},{"name":"auditing-terraform-infrastructure-for-security","description":"'Auditing Terraform infrastructure-as-code for security misconfigurations using Checkov, tfsec, Terrascan, and","domain":"cybersecurity","path":"skills/auditing-terraform-infrastructure-for-security"},{"name":"auditing-tls-certificate-transparency-logs","description":"'Monitors Certificate Transparency (CT) logs to detect unauthorized certificate issuance, discover subdomains","domain":"cybersecurity","path":"skills/auditing-tls-certificate-transparency-logs"},{"name":"automating-ioc-enrichment","description":"'Automates the enrichment of raw indicators of compromise with multi-source threat intelligence context using","domain":"cybersecurity","path":"skills/automating-ioc-enrichment"},{"name":"building-adversary-infrastructure-tracking-system","description":"Build an automated system to track adversary infrastructure using passive DNS, certificate transparency, WHOIS","domain":"cybersecurity","path":"skills/building-adversary-infrastructure-tracking-system"},{"name":"building-attack-pattern-library-from-cti-reports","description":"Extract and catalog attack patterns from cyber threat intelligence reports into a structured STIX-based library","domain":"cybersecurity","path":"skills/building-attack-pattern-library-from-cti-reports"},{"name":"building-automated-malware-submission-pipeline","description":"'Builds an automated malware submission and analysis pipeline that collects suspicious files from endpoints and","domain":"cybersecurity","path":"skills/building-automated-malware-submission-pipeline"},{"name":"building-c2-infrastructure-with-sliver-framework","description":"Build and configure a resilient command-and-control infrastructure using BishopFox's Sliver C2 framework with","domain":"cybersecurity","path":"skills/building-c2-infrastructure-with-sliver-framework"},{"name":"building-cloud-siem-with-sentinel","description":"'This skill covers deploying Microsoft Sentinel as a cloud-native SIEM and SOAR platform for centralized security","domain":"cybersecurity","path":"skills/building-cloud-siem-with-sentinel"},{"name":"building-detection-rule-with-splunk-spl","description":"Build effective detection rules using Splunk Search Processing Language (SPL) correlation searches to identify","domain":"cybersecurity","path":"skills/building-detection-rule-with-splunk-spl"},{"name":"building-detection-rules-with-sigma","description":"'Builds vendor-agnostic detection rules using the Sigma rule format for threat detection across SIEM platforms","domain":"cybersecurity","path":"skills/building-detection-rules-with-sigma"},{"name":"building-devsecops-pipeline-with-gitlab-ci","description":"Design and implement a comprehensive DevSecOps pipeline in GitLab CI/CD integrating SAST, DAST, container scanning,","domain":"cybersecurity","path":"skills/building-devsecops-pipeline-with-gitlab-ci"},{"name":"building-identity-federation-with-saml-azure-ad","description":"Establish SAML 2.0 identity federation between on-premises Active Directory and Azure AD (Microsoft Entra ID)","domain":"cybersecurity","path":"skills/building-identity-federation-with-saml-azure-ad"},{"name":"building-identity-governance-lifecycle-process","description":"'Builds comprehensive identity governance and lifecycle management processes including joiner-mover-leaver automation,","domain":"cybersecurity","path":"skills/building-identity-governance-lifecycle-process"},{"name":"building-incident-response-dashboard","description":"'Builds real-time incident response dashboards in Splunk, Elastic, or Grafana to provide SOC analysts and leadership","domain":"cybersecurity","path":"skills/building-incident-response-dashboard"},{"name":"building-incident-response-playbook","description":"'Designs and documents structured incident response playbooks that define step-by-step procedures for specific","domain":"cybersecurity","path":"skills/building-incident-response-playbook"},{"name":"building-incident-timeline-with-timesketch","description":"Build collaborative forensic incident timelines using Timesketch to ingest, normalize, and analyze multi-source","domain":"cybersecurity","path":"skills/building-incident-timeline-with-timesketch"},{"name":"building-ioc-defanging-and-sharing-pipeline","description":"Build an automated pipeline to defang indicators of compromise (URLs, IPs, domains, emails) for safe sharing","domain":"cybersecurity","path":"skills/building-ioc-defanging-and-sharing-pipeline"},{"name":"building-ioc-enrichment-pipeline-with-opencti","description":"OpenCTI is an open-source platform for managing cyber threat intelligence knowledge, built on STIX 2.1 as its","domain":"cybersecurity","path":"skills/building-ioc-enrichment-pipeline-with-opencti"},{"name":"building-malware-incident-communication-template","description":"Build structured communication templates for malware incidents including stakeholder notifications, executive","domain":"cybersecurity","path":"skills/building-malware-incident-communication-template"},{"name":"building-patch-tuesday-response-process","description":"Establish a structured operational process to triage, test, and deploy Microsoft Patch Tuesday security updates","domain":"cybersecurity","path":"skills/building-patch-tuesday-response-process"},{"name":"building-phishing-reporting-button-workflow","description":"Implement a phishing report button in email clients with automated triage workflow that analyzes user-reported","domain":"cybersecurity","path":"skills/building-phishing-reporting-button-workflow"},{"name":"building-ransomware-playbook-with-cisa-framework","description":"'Builds a structured ransomware incident response playbook aligned with the CISA StopRansomware Guide and NIST","domain":"cybersecurity","path":"skills/building-ransomware-playbook-with-cisa-framework"},{"name":"building-red-team-c2-infrastructure-with-havoc","description":"Deploy and configure the Havoc C2 framework with teamserver, HTTPS listeners, redirectors, and Demon agents for","domain":"cybersecurity","path":"skills/building-red-team-c2-infrastructure-with-havoc"},{"name":"building-role-mining-for-rbac-optimization","description":"Apply bottom-up and top-down role mining techniques to discover optimal RBAC roles from existing user-permission","domain":"cybersecurity","path":"skills/building-role-mining-for-rbac-optimization"},{"name":"building-soc-escalation-matrix","description":"Build a structured SOC escalation matrix defining severity tiers, response SLAs, escalation paths, and notification","domain":"cybersecurity","path":"skills/building-soc-escalation-matrix"},{"name":"building-soc-metrics-and-kpi-tracking","description":"'Builds SOC performance metrics and KPI tracking dashboards measuring Mean Time to Detect (MTTD), Mean Time to","domain":"cybersecurity","path":"skills/building-soc-metrics-and-kpi-tracking"},{"name":"building-soc-playbook-for-ransomware","description":"'Builds a structured SOC incident response playbook for ransomware attacks covering detection, containment, eradication,","domain":"cybersecurity","path":"skills/building-soc-playbook-for-ransomware"},{"name":"building-threat-actor-profile-from-osint","description":"Build comprehensive threat actor profiles using open-source intelligence (OSINT) techniques to document adversary","domain":"cybersecurity","path":"skills/building-threat-actor-profile-from-osint"},{"name":"building-threat-feed-aggregation-with-misp","description":"Deploy MISP (Malware Information Sharing Platform) to aggregate, correlate, and distribute threat intelligence","domain":"cybersecurity","path":"skills/building-threat-feed-aggregation-with-misp"},{"name":"building-threat-hunt-hypothesis-framework","description":"Build a systematic threat hunt hypothesis framework that transforms threat intelligence, attack patterns, and","domain":"cybersecurity","path":"skills/building-threat-hunt-hypothesis-framework"},{"name":"building-threat-intelligence-enrichment-in-splunk","description":"Build automated threat intelligence enrichment pipelines in Splunk Enterprise Security using lookup tables, modular","domain":"cybersecurity","path":"skills/building-threat-intelligence-enrichment-in-splunk"},{"name":"building-threat-intelligence-feed-integration","description":"'Builds automated threat intelligence feed integration pipelines connecting STIX/TAXII feeds, open-source threat","domain":"cybersecurity","path":"skills/building-threat-intelligence-feed-integration"},{"name":"building-threat-intelligence-platform","description":"Building a Threat Intelligence Platform (TIP) involves deploying and integrating multiple CTI tools into a unified","domain":"cybersecurity","path":"skills/building-threat-intelligence-platform"},{"name":"building-vulnerability-aging-and-sla-tracking","description":"Implement a vulnerability aging dashboard and SLA tracking system to measure remediation performance against","domain":"cybersecurity","path":"skills/building-vulnerability-aging-and-sla-tracking"},{"name":"building-vulnerability-dashboard-with-defectdojo","description":"Deploy DefectDojo as a centralized vulnerability management dashboard with scanner integrations, deduplication,","domain":"cybersecurity","path":"skills/building-vulnerability-dashboard-with-defectdojo"},{"name":"building-vulnerability-exception-tracking-system","description":"Build a vulnerability exception and risk acceptance tracking system with approval workflows, compensating controls","domain":"cybersecurity","path":"skills/building-vulnerability-exception-tracking-system"},{"name":"building-vulnerability-scanning-workflow","description":"'Builds a structured vulnerability scanning workflow using tools like Nessus, Qualys, and OpenVAS to discover,","domain":"cybersecurity","path":"skills/building-vulnerability-scanning-workflow"},{"name":"bypassing-authentication-with-forced-browsing","description":"Discovering and accessing unprotected pages, APIs, and administrative interfaces by enumerating URLs and bypassing","domain":"cybersecurity","path":"skills/bypassing-authentication-with-forced-browsing"},{"name":"collecting-indicators-of-compromise","description":"'Systematically collects, categorizes, and distributes indicators of compromise (IOCs) during and after security","domain":"cybersecurity","path":"skills/collecting-indicators-of-compromise"},{"name":"collecting-open-source-intelligence","description":"'Collects and synthesizes open-source intelligence (OSINT) about threat actors, malicious infrastructure, and","domain":"cybersecurity","path":"skills/collecting-open-source-intelligence"},{"name":"collecting-threat-intelligence-with-misp","description":"MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform for gathering, sharing,","domain":"cybersecurity","path":"skills/collecting-threat-intelligence-with-misp"},{"name":"collecting-volatile-evidence-from-compromised-host","description":"Collect volatile forensic evidence from a compromised system following order of volatility, preserving memory,","domain":"cybersecurity","path":"skills/collecting-volatile-evidence-from-compromised-host"},{"name":"conducting-api-security-testing","description":"'Conducts security testing of REST, GraphQL, and gRPC APIs to identify vulnerabilities in authentication, authorization,","domain":"cybersecurity","path":"skills/conducting-api-security-testing"},{"name":"conducting-cloud-incident-response","description":"'Responds to security incidents in cloud environments (AWS, Azure, GCP) by performing identity-based containment,","domain":"cybersecurity","path":"skills/conducting-cloud-incident-response"},{"name":"conducting-cloud-penetration-testing","description":"'This skill outlines methodologies for performing authorized penetration testing against AWS, Azure, and GCP","domain":"cybersecurity","path":"skills/conducting-cloud-penetration-testing"},{"name":"conducting-domain-persistence-with-dcsync","description":"Perform DCSync attacks to replicate Active Directory credentials and establish domain persistence by extracting","domain":"cybersecurity","path":"skills/conducting-domain-persistence-with-dcsync"},{"name":"conducting-external-reconnaissance-with-osint","description":"'Conducts external reconnaissance using Open Source Intelligence (OSINT) techniques to map an organization''s","domain":"cybersecurity","path":"skills/conducting-external-reconnaissance-with-osint"},{"name":"conducting-full-scope-red-team-engagement","description":"Plan and execute a comprehensive red team engagement covering reconnaissance through post-exploitation using","domain":"cybersecurity","path":"skills/conducting-full-scope-red-team-engagement"},{"name":"conducting-internal-network-penetration-test","description":"Execute an internal network penetration test simulating an insider threat or post-breach attacker to identify","domain":"cybersecurity","path":"skills/conducting-internal-network-penetration-test"},{"name":"conducting-internal-reconnaissance-with-bloodhound-ce","description":"Conduct internal Active Directory reconnaissance using BloodHound Community Edition to map attack paths, identify","domain":"cybersecurity","path":"skills/conducting-internal-reconnaissance-with-bloodhound-ce"},{"name":"conducting-malware-incident-response","description":"'Responds to malware infections across enterprise endpoints by identifying the malware family, determining infection","domain":"cybersecurity","path":"skills/conducting-malware-incident-response"},{"name":"conducting-man-in-the-middle-attack-simulation","description":"'Simulates man-in-the-middle attacks using Ettercap, mitmproxy, and Bettercap in authorized environments to intercept,","domain":"cybersecurity","path":"skills/conducting-man-in-the-middle-attack-simulation"},{"name":"conducting-memory-forensics-with-volatility","description":"'Performs memory forensics analysis using Volatility 3 to extract evidence of malware execution, process injection,","domain":"cybersecurity","path":"skills/conducting-memory-forensics-with-volatility"},{"name":"conducting-mobile-app-penetration-test","description":"'Conducts penetration testing of iOS and Android mobile applications following the OWASP Mobile Application Security","domain":"cybersecurity","path":"skills/conducting-mobile-app-penetration-test"},{"name":"conducting-network-penetration-test","description":"'Conducts comprehensive network penetration tests against authorized target environments by performing host discovery,","domain":"cybersecurity","path":"skills/conducting-network-penetration-test"},{"name":"conducting-pass-the-ticket-attack","description":"Pass-the-Ticket (PtT) is a lateral movement technique that uses stolen Kerberos tickets (TGT or TGS) to authenticate","domain":"cybersecurity","path":"skills/conducting-pass-the-ticket-attack"},{"name":"conducting-phishing-incident-response","description":"'Responds to phishing incidents by analyzing reported emails, extracting indicators, assessing credential compromise,","domain":"cybersecurity","path":"skills/conducting-phishing-incident-response"},{"name":"conducting-post-incident-lessons-learned","description":"Facilitate structured post-incident reviews to identify root causes, document what worked and failed, and produce","domain":"cybersecurity","path":"skills/conducting-post-incident-lessons-learned"},{"name":"conducting-social-engineering-penetration-test","description":"Design and execute a social engineering penetration test including phishing, vishing, smishing, and physical","domain":"cybersecurity","path":"skills/conducting-social-engineering-penetration-test"},{"name":"conducting-social-engineering-pretext-call","description":"Plan and execute authorized vishing (voice phishing) pretext calls to assess employee susceptibility to social","domain":"cybersecurity","path":"skills/conducting-social-engineering-pretext-call"},{"name":"conducting-spearphishing-simulation-campaign","description":"Spearphishing simulation is a targeted social engineering attack vector used by red teams to gain initial access.","domain":"cybersecurity","path":"skills/conducting-spearphishing-simulation-campaign"},{"name":"conducting-wireless-network-penetration-test","description":"'Conducts authorized wireless network penetration tests to assess the security of WiFi infrastructure by testing","domain":"cybersecurity","path":"skills/conducting-wireless-network-penetration-test"},{"name":"configuring-active-directory-tiered-model","description":"Implement Microsoft's Enhanced Security Admin Environment (ESAE) tiered administration model for Active Directory.","domain":"cybersecurity","path":"skills/configuring-active-directory-tiered-model"},{"name":"configuring-aws-verified-access-for-ztna","description":"Configure AWS Verified Access to provide VPN-less zero trust network access to internal applications using identity","domain":"cybersecurity","path":"skills/configuring-aws-verified-access-for-ztna"},{"name":"configuring-certificate-authority-with-openssl","description":"A Certificate Authority (CA) is the trust anchor in a PKI hierarchy, responsible for issuing, signing, and revoking","domain":"cybersecurity","path":"skills/configuring-certificate-authority-with-openssl"},{"name":"configuring-host-based-intrusion-detection","description":"'Configures host-based intrusion detection systems (HIDS) to monitor endpoint file integrity, system calls, and","domain":"cybersecurity","path":"skills/configuring-host-based-intrusion-detection"},{"name":"configuring-hsm-for-key-storage","description":"Hardware Security Modules (HSMs) are tamper-resistant physical devices that safeguard cryptographic keys and","domain":"cybersecurity","path":"skills/configuring-hsm-for-key-storage"},{"name":"configuring-identity-aware-proxy-with-google-iap","description":"'Configuring Google Cloud Identity-Aware Proxy (IAP) to enforce per-request identity verification for Compute","domain":"cybersecurity","path":"skills/configuring-identity-aware-proxy-with-google-iap"},{"name":"configuring-ldap-security-hardening","description":"Harden LDAP directory services against common attacks including credential harvesting, LDAP injection, anonymous","domain":"cybersecurity","path":"skills/configuring-ldap-security-hardening"},{"name":"configuring-microsegmentation-for-zero-trust","description":"Configure microsegmentation policies to enforce least-privilege workload-to-workload access using tools like","domain":"cybersecurity","path":"skills/configuring-microsegmentation-for-zero-trust"},{"name":"configuring-multi-factor-authentication-with-duo","description":"Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points.","domain":"cybersecurity","path":"skills/configuring-multi-factor-authentication-with-duo"},{"name":"configuring-network-segmentation-with-vlans","description":"'Designs and implements VLAN-based network segmentation on managed switches to isolate network zones, enforce","domain":"cybersecurity","path":"skills/configuring-network-segmentation-with-vlans"},{"name":"configuring-oauth2-authorization-flow","description":"Configure secure OAuth 2.0 authorization flows including Authorization Code with PKCE, Client Credentials, and","domain":"cybersecurity","path":"skills/configuring-oauth2-authorization-flow"},{"name":"configuring-pfsense-firewall-rules","description":"'Configures pfSense firewall rules, NAT policies, VPN tunnels, and traffic shaping to enforce network segmentation,","domain":"cybersecurity","path":"skills/configuring-pfsense-firewall-rules"},{"name":"configuring-snort-ids-for-intrusion-detection","description":"'Installs, configures, and tunes Snort 3 intrusion detection system to monitor network traffic for malicious","domain":"cybersecurity","path":"skills/configuring-snort-ids-for-intrusion-detection"},{"name":"configuring-suricata-for-network-monitoring","description":"'Deploys and configures Suricata IDS/IPS with Emerging Threats rulesets, EVE JSON logging, and custom rules for","domain":"cybersecurity","path":"skills/configuring-suricata-for-network-monitoring"},{"name":"configuring-tls-1-3-for-secure-communications","description":"TLS 1.3 (RFC 8446) is the latest version of the Transport Layer Security protocol, providing significant improvements","domain":"cybersecurity","path":"skills/configuring-tls-1-3-for-secure-communications"},{"name":"configuring-windows-defender-advanced-settings","description":"'Configures Microsoft Defender for Endpoint (MDE) advanced protection settings including attack surface reduction","domain":"cybersecurity","path":"skills/configuring-windows-defender-advanced-settings"},{"name":"configuring-windows-event-logging-for-detection","description":"'Configures Windows Event Logging with advanced audit policies to generate high-fidelity security events for","domain":"cybersecurity","path":"skills/configuring-windows-event-logging-for-detection"},{"name":"configuring-zscaler-private-access-for-ztna","description":"'Configuring Zscaler Private Access (ZPA) to replace traditional VPN with zero trust network access by deploying","domain":"cybersecurity","path":"skills/configuring-zscaler-private-access-for-ztna"},{"name":"containing-active-breach","description":"'Executes containment strategies to stop active adversary operations and prevent lateral movement during a confirmed","domain":"cybersecurity","path":"skills/containing-active-breach"},{"name":"correlating-security-events-in-qradar","description":"'Correlates security events in IBM QRadar SIEM using AQL (Ariel Query Language), custom rules, building blocks,","domain":"cybersecurity","path":"skills/correlating-security-events-in-qradar"},{"name":"correlating-threat-campaigns","description":"'Correlates disparate security incidents, IOCs, and adversary behaviors across time and organizations to identify","domain":"cybersecurity","path":"skills/correlating-threat-campaigns"},{"name":"deobfuscating-javascript-malware","description":"'Deobfuscates malicious JavaScript code used in web-based attacks, phishing pages, and dropper scripts by reversing","domain":"cybersecurity","path":"skills/deobfuscating-javascript-malware"},{"name":"deobfuscating-powershell-obfuscated-malware","description":"Systematically deobfuscate multi-layer PowerShell malware using AST analysis, dynamic tracing, and tools like","domain":"cybersecurity","path":"skills/deobfuscating-powershell-obfuscated-malware"},{"name":"deploying-active-directory-honeytokens","description":"'Deploys deception-based honeytokens in Active Directory including fake privileged accounts with AdminCount=1,","domain":"cybersecurity","path":"skills/deploying-active-directory-honeytokens"},{"name":"deploying-cloudflare-access-for-zero-trust","description":"'Deploying Cloudflare Access with Cloudflare Tunnel to provide zero trust access to self-hosted and private applications,","domain":"cybersecurity","path":"skills/deploying-cloudflare-access-for-zero-trust"},{"name":"deploying-decoy-files-for-ransomware-detection","description":"'Deploys canary files (honeytokens) across file systems to detect ransomware encryption activity in real time.","domain":"cybersecurity","path":"skills/deploying-decoy-files-for-ransomware-detection"},{"name":"deploying-edr-agent-with-crowdstrike","description":"'Deploys and configures CrowdStrike Falcon EDR agents across enterprise endpoints to enable real-time threat","domain":"cybersecurity","path":"skills/deploying-edr-agent-with-crowdstrike"},{"name":"deploying-osquery-for-endpoint-monitoring","description":"'Deploys and configures osquery for real-time endpoint monitoring using SQL-based queries to inspect running","domain":"cybersecurity","path":"skills/deploying-osquery-for-endpoint-monitoring"},{"name":"deploying-palo-alto-prisma-access-zero-trust","description":"'Deploying Palo Alto Networks Prisma Access for SASE-based zero trust network access using GlobalProtect agents,","domain":"cybersecurity","path":"skills/deploying-palo-alto-prisma-access-zero-trust"},{"name":"deploying-ransomware-canary-files","description":"'Deploys and monitors ransomware canary files across critical directories using Python''s watchdog library for","domain":"cybersecurity","path":"skills/deploying-ransomware-canary-files"},{"name":"deploying-software-defined-perimeter","description":"Deploy a Software-Defined Perimeter using the CSA v2.0 specification with Single Packet Authorization, mutual","domain":"cybersecurity","path":"skills/deploying-software-defined-perimeter"},{"name":"deploying-tailscale-for-zero-trust-vpn","description":"Deploy and configure Tailscale as a WireGuard-based zero trust mesh VPN with identity-aware access controls,","domain":"cybersecurity","path":"skills/deploying-tailscale-for-zero-trust-vpn"},{"name":"detecting-ai-model-prompt-injection-attacks","description":"'Detects prompt injection attacks targeting LLM-based applications using a multi-layered defense combining regex","domain":"cybersecurity","path":"skills/detecting-ai-model-prompt-injection-attacks"},{"name":"detecting-anomalies-in-industrial-control-systems","description":"'This skill covers deploying anomaly detection systems for industrial control environments using machine learning","domain":"cybersecurity","path":"skills/detecting-anomalies-in-industrial-control-systems"},{"name":"detecting-anomalous-authentication-patterns","description":"'Detects anomalous authentication patterns using UEBA analytics, statistical baselines, and machine learning","domain":"cybersecurity","path":"skills/detecting-anomalous-authentication-patterns"},{"name":"detecting-api-enumeration-attacks","description":"Detect and prevent API enumeration attacks including BOLA and IDOR exploitation by monitoring sequential identifier","domain":"cybersecurity","path":"skills/detecting-api-enumeration-attacks"},{"name":"detecting-arp-poisoning-in-network-traffic","description":"Detect and prevent ARP spoofing attacks using ARPWatch, Dynamic ARP Inspection, Wireshark analysis, and custom","domain":"cybersecurity","path":"skills/detecting-arp-poisoning-in-network-traffic"},{"name":"detecting-attacks-on-historian-servers","description":"'Detect cyber attacks targeting OT historian servers (OSIsoft PI, Ignition, Wonderware) that sit at the IT/OT","domain":"cybersecurity","path":"skills/detecting-attacks-on-historian-servers"},{"name":"detecting-attacks-on-scada-systems","description":"'This skill covers detecting cyber attacks targeting Supervisory Control and Data Acquisition (SCADA) systems","domain":"cybersecurity","path":"skills/detecting-attacks-on-scada-systems"},{"name":"detecting-aws-cloudtrail-anomalies","description":"Detect unusual API call patterns in AWS CloudTrail logs using boto3, statistical baselining, and behavioral analysis","domain":"cybersecurity","path":"skills/detecting-aws-cloudtrail-anomalies"},{"name":"detecting-aws-credential-exposure-with-trufflehog","description":"'Detecting exposed AWS credentials in source code repositories, CI/CD pipelines, and configuration files using","domain":"cybersecurity","path":"skills/detecting-aws-credential-exposure-with-trufflehog"},{"name":"detecting-aws-guardduty-findings-automation","description":"Automate AWS GuardDuty threat detection findings processing using EventBridge and Lambda to enable real-time","domain":"cybersecurity","path":"skills/detecting-aws-guardduty-findings-automation"},{"name":"detecting-aws-iam-privilege-escalation","description":"Detect AWS IAM privilege escalation paths using boto3 and Cloudsplaining policy analysis to identify overly permissive","domain":"cybersecurity","path":"skills/detecting-aws-iam-privilege-escalation"},{"name":"detecting-azure-lateral-movement","description":"Detect lateral movement in Azure AD/Entra ID environments using Microsoft Graph API audit logs, Azure Sentinel","domain":"cybersecurity","path":"skills/detecting-azure-lateral-movement"},{"name":"detecting-azure-service-principal-abuse","description":"Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin","domain":"cybersecurity","path":"skills/detecting-azure-service-principal-abuse"},{"name":"detecting-azure-storage-account-misconfigurations","description":"Audit Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing","domain":"cybersecurity","path":"skills/detecting-azure-storage-account-misconfigurations"},{"name":"detecting-beaconing-patterns-with-zeek","description":"'Performs statistical analysis of Zeek conn.log connection intervals to detect C2 beaconing patterns. Uses the","domain":"cybersecurity","path":"skills/detecting-beaconing-patterns-with-zeek"},{"name":"detecting-bluetooth-low-energy-attacks","description":"'Detects and analyzes Bluetooth Low Energy (BLE) security attacks including sniffing, replay attacks, GATT enumeration","domain":"cybersecurity","path":"skills/detecting-bluetooth-low-energy-attacks"},{"name":"detecting-broken-object-property-level-authorization","description":"Detect and test for OWASP API3:2023 Broken Object Property Level Authorization vulnerabilities including excessive","domain":"cybersecurity","path":"skills/detecting-broken-object-property-level-authorization"},{"name":"detecting-business-email-compromise","description":"Business Email Compromise (BEC) is a sophisticated fraud scheme where attackers impersonate executives, vendors,","domain":"cybersecurity","path":"skills/detecting-business-email-compromise"},{"name":"detecting-business-email-compromise-with-ai","description":"Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing","domain":"cybersecurity","path":"skills/detecting-business-email-compromise-with-ai"},{"name":"detecting-cloud-threats-with-guardduty","description":"'This skill teaches security teams how to deploy and operationalize Amazon GuardDuty for continuous threat detection","domain":"cybersecurity","path":"skills/detecting-cloud-threats-with-guardduty"},{"name":"detecting-command-and-control-over-dns","description":"'Detects command-and-control (C2) communications tunneled through DNS protocol including DNS tunneling tools","domain":"cybersecurity","path":"skills/detecting-command-and-control-over-dns"},{"name":"detecting-compromised-cloud-credentials","description":"'Detecting compromised cloud credentials across AWS, Azure, and GCP by analyzing anomalous API activity, impossible","domain":"cybersecurity","path":"skills/detecting-compromised-cloud-credentials"},{"name":"detecting-container-drift-at-runtime","description":"Detect unauthorized modifications to running containers by monitoring for binary execution drift, file system","domain":"cybersecurity","path":"skills/detecting-container-drift-at-runtime"},{"name":"detecting-container-escape-attempts","description":"Container escape is a critical attack technique where an adversary breaks out of container isolation to access","domain":"cybersecurity","path":"skills/detecting-container-escape-attempts"},{"name":"detecting-container-escape-with-falco-rules","description":"Detect container escape attempts in real-time using Falco runtime security rules that monitor syscalls, file","domain":"cybersecurity","path":"skills/detecting-container-escape-with-falco-rules"},{"name":"detecting-credential-dumping-techniques","description":"Detect LSASS credential dumping, SAM database extraction, and NTDS.dit theft using Sysmon Event ID 10, Windows","domain":"cybersecurity","path":"skills/detecting-credential-dumping-techniques"},{"name":"detecting-cryptomining-in-cloud","description":"'This skill teaches security teams how to detect and respond to unauthorized cryptocurrency mining operations","domain":"cybersecurity","path":"skills/detecting-cryptomining-in-cloud"},{"name":"detecting-dcsync-attack-in-active-directory","description":"Detect DCSync attacks where adversaries abuse Active Directory replication privileges to extract password hashes","domain":"cybersecurity","path":"skills/detecting-dcsync-attack-in-active-directory"},{"name":"detecting-deepfake-audio-in-vishing-attacks","description":"'Detects AI-generated deepfake audio used in voice phishing (vishing) attacks by extracting spectral features","domain":"cybersecurity","path":"skills/detecting-deepfake-audio-in-vishing-attacks"},{"name":"detecting-dll-sideloading-attacks","description":"Detect DLL side-loading attacks where adversaries place malicious DLLs alongside legitimate applications to hijack","domain":"cybersecurity","path":"skills/detecting-dll-sideloading-attacks"},{"name":"detecting-dnp3-protocol-anomalies","description":"'Detect anomalies in DNP3 (Distributed Network Protocol 3) communications used in SCADA systems by monitoring","domain":"cybersecurity","path":"skills/detecting-dnp3-protocol-anomalies"},{"name":"detecting-dns-exfiltration-with-dns-query-analysis","description":"Detect data exfiltration through DNS tunneling by analyzing query entropy, subdomain length, query volume, TXT","domain":"cybersecurity","path":"skills/detecting-dns-exfiltration-with-dns-query-analysis"},{"name":"detecting-email-account-compromise","description":"Detect compromised O365 and Google Workspace email accounts by analyzing inbox rule creation, suspicious sign-in","domain":"cybersecurity","path":"skills/detecting-email-account-compromise"},{"name":"detecting-email-forwarding-rules-attack","description":"Detect malicious email forwarding rules created by adversaries to maintain persistent access to email communications","domain":"cybersecurity","path":"skills/detecting-email-forwarding-rules-attack"},{"name":"detecting-evasion-techniques-in-endpoint-logs","description":"'Detects defense evasion techniques used by adversaries in endpoint logs including log tampering, timestomping,","domain":"cybersecurity","path":"skills/detecting-evasion-techniques-in-endpoint-logs"},{"name":"detecting-exfiltration-over-dns-with-zeek","description":"Detect DNS-based data exfiltration by analyzing Zeek dns.log for high-entropy subdomains and anomalous query","domain":"cybersecurity","path":"skills/detecting-exfiltration-over-dns-with-zeek"},{"name":"detecting-fileless-attacks-on-endpoints","description":"'Detects fileless malware and in-memory attacks that execute entirely in RAM without writing persistent files","domain":"cybersecurity","path":"skills/detecting-fileless-attacks-on-endpoints"},{"name":"detecting-fileless-malware-techniques","description":"'Detects and analyzes fileless malware that operates entirely in memory using PowerShell, WMI, .NET reflection,","domain":"cybersecurity","path":"skills/detecting-fileless-malware-techniques"},{"name":"detecting-golden-ticket-attacks-in-kerberos-logs","description":"Detect Golden Ticket attacks in Active Directory by analyzing Kerberos TGT anomalies including mismatched encryption","domain":"cybersecurity","path":"skills/detecting-golden-ticket-attacks-in-kerberos-logs"},{"name":"detecting-golden-ticket-forgery","description":"Detect Kerberos Golden Ticket forgery by analyzing Windows Event ID 4769 for RC4 encryption downgrades (0x17),","domain":"cybersecurity","path":"skills/detecting-golden-ticket-forgery"},{"name":"detecting-insider-data-exfiltration-via-dlp","description":"'Detects insider data exfiltration by analyzing DLP policy violations, file access patterns, upload volume anomalies,","domain":"cybersecurity","path":"skills/detecting-insider-data-exfiltration-via-dlp"},{"name":"detecting-insider-threat-behaviors","description":"Detect insider threat behavioral indicators including unusual data access, off-hours activity, mass file downloads,","domain":"cybersecurity","path":"skills/detecting-insider-threat-behaviors"},{"name":"detecting-insider-threat-with-ueba","description":"Implement User and Entity Behavior Analytics using Elasticsearch/OpenSearch to build behavioral baselines, calculate","domain":"cybersecurity","path":"skills/detecting-insider-threat-with-ueba"},{"name":"detecting-kerberoasting-attacks","description":"Detect Kerberoasting attacks by monitoring for anomalous Kerberos TGS requests targeting service accounts with","domain":"cybersecurity","path":"skills/detecting-kerberoasting-attacks"},{"name":"detecting-lateral-movement-in-network","description":"'Identifies lateral movement techniques in enterprise networks by analyzing authentication logs, network flows,","domain":"cybersecurity","path":"skills/detecting-lateral-movement-in-network"},{"name":"detecting-lateral-movement-with-splunk","description":"Detect adversary lateral movement across networks using Splunk SPL queries against Windows authentication logs,","domain":"cybersecurity","path":"skills/detecting-lateral-movement-with-splunk"},{"name":"detecting-lateral-movement-with-zeek","description":"'Detect lateral movement in network traffic using Zeek (formerly Bro) log analysis. Parses conn.log, smb_mapping.log,","domain":"cybersecurity","path":"skills/detecting-lateral-movement-with-zeek"},{"name":"detecting-living-off-the-land-attacks","description":"'Detect abuse of legitimate Windows binaries (LOLBins) used for living off the land attacks. Monitors process","domain":"cybersecurity","path":"skills/detecting-living-off-the-land-attacks"},{"name":"detecting-living-off-the-land-with-lolbas","description":"Detect Living Off the Land Binaries (LOLBins/LOLBAS) abuse including certutil, regsvr32, mshta, and rundll32","domain":"cybersecurity","path":"skills/detecting-living-off-the-land-with-lolbas"},{"name":"detecting-malicious-scheduled-tasks-with-sysmon","description":"'Detect malicious scheduled task creation and modification using Sysmon Event IDs 1 (Process Create for schtasks.exe),","domain":"cybersecurity","path":"skills/detecting-malicious-scheduled-tasks-with-sysmon"},{"name":"detecting-mimikatz-execution-patterns","description":"Detect Mimikatz execution through command-line patterns, LSASS access signatures, binary indicators, and in-memory","domain":"cybersecurity","path":"skills/detecting-mimikatz-execution-patterns"},{"name":"detecting-misconfigured-azure-storage","description":"'Detecting misconfigured Azure Storage accounts including publicly accessible blob containers, missing encryption","domain":"cybersecurity","path":"skills/detecting-misconfigured-azure-storage"},{"name":"detecting-mobile-malware-behavior","description":"'Detects and analyzes malicious behavior in mobile applications through behavioral analysis, permission abuse","domain":"cybersecurity","path":"skills/detecting-mobile-malware-behavior"},{"name":"detecting-modbus-command-injection-attacks","description":"'Detect command injection attacks against Modbus TCP/RTU protocol in ICS environments by monitoring for unauthorized","domain":"cybersecurity","path":"skills/detecting-modbus-command-injection-attacks"},{"name":"detecting-modbus-protocol-anomalies","description":"'This skill covers detecting anomalies in Modbus/TCP and Modbus RTU communications in industrial control systems.","domain":"cybersecurity","path":"skills/detecting-modbus-protocol-anomalies"},{"name":"detecting-network-anomalies-with-zeek","description":"'Deploys and configures Zeek (formerly Bro) network security monitor to passively analyze network traffic, generate","domain":"cybersecurity","path":"skills/detecting-network-anomalies-with-zeek"},{"name":"detecting-network-scanning-with-ids-signatures","description":"Detect network reconnaissance and port scanning using Suricata and Snort IDS signatures, threshold-based detection","domain":"cybersecurity","path":"skills/detecting-network-scanning-with-ids-signatures"},{"name":"detecting-ntlm-relay-with-event-correlation","description":"'Detect NTLM relay attacks through Windows Security Event correlation by analyzing Event 4624 LogonType 3 for","domain":"cybersecurity","path":"skills/detecting-ntlm-relay-with-event-correlation"},{"name":"detecting-oauth-token-theft","description":"'Detects and responds to OAuth token theft and replay attacks in cloud environments, focusing on Microsoft Entra","domain":"cybersecurity","path":"skills/detecting-oauth-token-theft"},{"name":"detecting-pass-the-hash-attacks","description":"Detect Pass-the-Hash attacks by analyzing NTLM authentication patterns, identifying Type 3 logons with NTLM where","domain":"cybersecurity","path":"skills/detecting-pass-the-hash-attacks"},{"name":"detecting-pass-the-ticket-attacks","description":"Detect Kerberos Pass-the-Ticket (PtT) attacks by analyzing Windows Event IDs 4768, 4769, and 4771 for anomalous","domain":"cybersecurity","path":"skills/detecting-pass-the-ticket-attacks"},{"name":"detecting-port-scanning-with-fail2ban","description":"'Configures Fail2ban with custom filters and actions to detect port scanning activity, SSH brute force attempts,","domain":"cybersecurity","path":"skills/detecting-port-scanning-with-fail2ban"},{"name":"detecting-privilege-escalation-attempts","description":"Detect privilege escalation attempts including token manipulation, UAC bypass, unquoted service paths, kernel","domain":"cybersecurity","path":"skills/detecting-privilege-escalation-attempts"},{"name":"detecting-privilege-escalation-in-kubernetes-pods","description":"Detect and prevent privilege escalation in Kubernetes pods by monitoring security contexts, capabilities, and","domain":"cybersecurity","path":"skills/detecting-privilege-escalation-in-kubernetes-pods"},{"name":"detecting-process-hollowing-technique","description":"Detect process hollowing (T1055.012) by analyzing memory-mapped sections, hollowed process indicators, and parent-child","domain":"cybersecurity","path":"skills/detecting-process-hollowing-technique"},{"name":"detecting-process-injection-techniques","description":"'Detects and analyzes process injection techniques used by malware including classic DLL injection, process hollowing,","domain":"cybersecurity","path":"skills/detecting-process-injection-techniques"},{"name":"detecting-qr-code-phishing-with-email-security","description":"Detect and prevent QR code phishing (quishing) attacks that bypass traditional email security by embedding malicious","domain":"cybersecurity","path":"skills/detecting-qr-code-phishing-with-email-security"},{"name":"detecting-ransomware-encryption-behavior","description":"'Detects ransomware encryption activity in real time using entropy analysis, file system I/O monitoring, and","domain":"cybersecurity","path":"skills/detecting-ransomware-encryption-behavior"},{"name":"detecting-ransomware-precursors-in-network","description":"'Detects early-stage ransomware indicators in network traffic before encryption begins, including initial access","domain":"cybersecurity","path":"skills/detecting-ransomware-precursors-in-network"},{"name":"detecting-rdp-brute-force-attacks","description":"Detect RDP brute force attacks by analyzing Windows Security Event Logs for failed authentication patterns (Event","domain":"cybersecurity","path":"skills/detecting-rdp-brute-force-attacks"},{"name":"detecting-rootkit-activity","description":"'Detects rootkit presence on compromised systems by identifying hidden processes, hooked system calls, modified","domain":"cybersecurity","path":"skills/detecting-rootkit-activity"},{"name":"detecting-s3-data-exfiltration-attempts","description":"'Detecting data exfiltration attempts from AWS S3 buckets by analyzing CloudTrail S3 data events, VPC Flow Logs,","domain":"cybersecurity","path":"skills/detecting-s3-data-exfiltration-attempts"},{"name":"detecting-serverless-function-injection","description":"'Detects and prevents code injection attacks targeting serverless functions (AWS Lambda, Azure Functions, Google","domain":"cybersecurity","path":"skills/detecting-serverless-function-injection"},{"name":"detecting-service-account-abuse","description":"Detect abuse of service accounts through anomalous interactive logons, privilege escalation, lateral movement,","domain":"cybersecurity","path":"skills/detecting-service-account-abuse"},{"name":"detecting-shadow-api-endpoints","description":"Discover and inventory shadow API endpoints that operate outside documented specifications using traffic analysis,","domain":"cybersecurity","path":"skills/detecting-shadow-api-endpoints"},{"name":"detecting-shadow-it-cloud-usage","description":"Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow","domain":"cybersecurity","path":"skills/detecting-shadow-it-cloud-usage"},{"name":"detecting-spearphishing-with-email-gateway","description":"Spearphishing targets specific individuals using personalized, researched content that bypasses generic spam","domain":"cybersecurity","path":"skills/detecting-spearphishing-with-email-gateway"},{"name":"detecting-sql-injection-via-waf-logs","description":"Analyze WAF (ModSecurity/AWS WAF/Cloudflare) logs to detect SQL injection attack campaigns. Parses ModSecurity","domain":"cybersecurity","path":"skills/detecting-sql-injection-via-waf-logs"},{"name":"detecting-stuxnet-style-attacks","description":"'This skill covers detecting sophisticated cyber-physical attacks that follow the Stuxnet attack pattern of modifying","domain":"cybersecurity","path":"skills/detecting-stuxnet-style-attacks"},{"name":"detecting-supply-chain-attacks-in-ci-cd","description":"'Scans GitHub Actions workflows and CI/CD pipeline configurations for supply chain attack vectors including unpinned","domain":"cybersecurity","path":"skills/detecting-supply-chain-attacks-in-ci-cd"},{"name":"detecting-suspicious-oauth-application-consent","description":"Detect risky OAuth application consent grants in Azure AD / Microsoft Entra ID using Microsoft Graph API, audit","domain":"cybersecurity","path":"skills/detecting-suspicious-oauth-application-consent"},{"name":"detecting-suspicious-powershell-execution","description":"Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts,","domain":"cybersecurity","path":"skills/detecting-suspicious-powershell-execution"},{"name":"detecting-t1003-credential-dumping-with-edr","description":"Detect OS credential dumping techniques targeting LSASS memory, SAM database, NTDS.dit, and cached credentials","domain":"cybersecurity","path":"skills/detecting-t1003-credential-dumping-with-edr"},{"name":"detecting-t1055-process-injection-with-sysmon","description":"Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection","domain":"cybersecurity","path":"skills/detecting-t1055-process-injection-with-sysmon"},{"name":"detecting-t1548-abuse-elevation-control-mechanism","description":"Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation","domain":"cybersecurity","path":"skills/detecting-t1548-abuse-elevation-control-mechanism"},{"name":"detecting-typosquatting-packages-in-npm-pypi","description":"'Detects typosquatting attacks in npm and PyPI package registries by analyzing package name similarity using","domain":"cybersecurity","path":"skills/detecting-typosquatting-packages-in-npm-pypi"},{"name":"detecting-wmi-persistence","description":"Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter,","domain":"cybersecurity","path":"skills/detecting-wmi-persistence"},{"name":"eradicating-malware-from-infected-systems","description":"Systematically remove malware, backdoors, and attacker persistence mechanisms from infected systems while ensuring","domain":"cybersecurity","path":"skills/eradicating-malware-from-infected-systems"},{"name":"evaluating-threat-intelligence-platforms","description":"'Evaluates and selects Threat Intelligence Platform (TIP) products based on organizational requirements including","domain":"cybersecurity","path":"skills/evaluating-threat-intelligence-platforms"},{"name":"executing-active-directory-attack-simulation","description":"'Executes authorized attack simulations against Active Directory environments to identify misconfigurations,","domain":"cybersecurity","path":"skills/executing-active-directory-attack-simulation"},{"name":"executing-phishing-simulation-campaign","description":"'Executes authorized phishing simulation campaigns to assess an organization''s susceptibility to email-based","domain":"cybersecurity","path":"skills/executing-phishing-simulation-campaign"},{"name":"executing-red-team-engagement-planning","description":"Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE),","domain":"cybersecurity","path":"skills/executing-red-team-engagement-planning"},{"name":"executing-red-team-exercise","description":"'Executes comprehensive red team exercises that simulate real-world adversary operations against an organization''s","domain":"cybersecurity","path":"skills/executing-red-team-exercise"},{"name":"exploiting-active-directory-certificate-services-esc1","description":"Exploit misconfigured Active Directory Certificate Services (AD CS) ESC1 vulnerability to request certificates","domain":"cybersecurity","path":"skills/exploiting-active-directory-certificate-services-esc1"},{"name":"exploiting-active-directory-with-bloodhound","description":"BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and","domain":"cybersecurity","path":"skills/exploiting-active-directory-with-bloodhound"},{"name":"exploiting-api-injection-vulnerabilities","description":"'Tests APIs for injection vulnerabilities including SQL injection, NoSQL injection, OS command injection, LDAP","domain":"cybersecurity","path":"skills/exploiting-api-injection-vulnerabilities"},{"name":"exploiting-bgp-hijacking-vulnerabilities","description":"'Analyzes and simulates BGP hijacking scenarios in authorized lab environments to assess route origin validation,","domain":"cybersecurity","path":"skills/exploiting-bgp-hijacking-vulnerabilities"},{"name":"exploiting-broken-function-level-authorization","description":"'Tests APIs for Broken Function Level Authorization (BFLA) vulnerabilities where regular users can invoke administrative","domain":"cybersecurity","path":"skills/exploiting-broken-function-level-authorization"},{"name":"exploiting-broken-link-hijacking","description":"Discover and exploit broken link hijacking vulnerabilities by identifying references to expired domains, decommissioned","domain":"cybersecurity","path":"skills/exploiting-broken-link-hijacking"},{"name":"exploiting-constrained-delegation-abuse","description":"Exploit Kerberos Constrained Delegation misconfigurations in Active Directory to impersonate privileged users","domain":"cybersecurity","path":"skills/exploiting-constrained-delegation-abuse"},{"name":"exploiting-deeplink-vulnerabilities","description":"'Tests and exploits deep link (URL scheme and App Link) vulnerabilities in Android and iOS mobile applications","domain":"cybersecurity","path":"skills/exploiting-deeplink-vulnerabilities"},{"name":"exploiting-excessive-data-exposure-in-api","description":"'Tests APIs for excessive data exposure where endpoints return more data than the client application needs, relying","domain":"cybersecurity","path":"skills/exploiting-excessive-data-exposure-in-api"},{"name":"exploiting-http-request-smuggling","description":"Detecting and exploiting HTTP request smuggling vulnerabilities caused by Content-Length and Transfer-Encoding","domain":"cybersecurity","path":"skills/exploiting-http-request-smuggling"},{"name":"exploiting-idor-vulnerabilities","description":"Identifying and exploiting Insecure Direct Object Reference vulnerabilities to access unauthorized resources","domain":"cybersecurity","path":"skills/exploiting-idor-vulnerabilities"},{"name":"exploiting-insecure-data-storage-in-mobile","description":"'Identifies and exploits insecure local data storage vulnerabilities in Android and iOS mobile applications including","domain":"cybersecurity","path":"skills/exploiting-insecure-data-storage-in-mobile"},{"name":"exploiting-insecure-deserialization","description":"Identifying and exploiting insecure deserialization vulnerabilities in Java, PHP, Python, and .NET applications","domain":"cybersecurity","path":"skills/exploiting-insecure-deserialization"},{"name":"exploiting-ipv6-vulnerabilities","description":"'Identifies and exploits IPv6-specific vulnerabilities including SLAAC spoofing, Router Advertisement flooding,","domain":"cybersecurity","path":"skills/exploiting-ipv6-vulnerabilities"},{"name":"exploiting-jwt-algorithm-confusion-attack","description":"'Exploits JWT algorithm confusion vulnerabilities where the server''s token verification library accepts the","domain":"cybersecurity","path":"skills/exploiting-jwt-algorithm-confusion-attack"},{"name":"exploiting-kerberoasting-with-impacket","description":"Perform Kerberoasting attacks using Impacket's GetUserSPNs to extract and crack Kerberos TGS tickets for Active","domain":"cybersecurity","path":"skills/exploiting-kerberoasting-with-impacket"},{"name":"exploiting-mass-assignment-in-rest-apis","description":"Discover and exploit mass assignment vulnerabilities in REST APIs to escalate privileges, modify restricted fields,","domain":"cybersecurity","path":"skills/exploiting-mass-assignment-in-rest-apis"},{"name":"exploiting-ms17-010-eternalblue-vulnerability","description":"MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code","domain":"cybersecurity","path":"skills/exploiting-ms17-010-eternalblue-vulnerability"},{"name":"exploiting-nopac-cve-2021-42278-42287","description":"Exploit the noPac vulnerability chain (CVE-2021-42278 sAMAccountName spoofing and CVE-2021-42287 KDC PAC confusion)","domain":"cybersecurity","path":"skills/exploiting-nopac-cve-2021-42278-42287"},{"name":"exploiting-nosql-injection-vulnerabilities","description":"Detect and exploit NoSQL injection vulnerabilities in MongoDB, CouchDB, and other NoSQL databases to demonstrate","domain":"cybersecurity","path":"skills/exploiting-nosql-injection-vulnerabilities"},{"name":"exploiting-oauth-misconfiguration","description":"Identifying and exploiting OAuth 2.0 and OpenID Connect misconfigurations including redirect URI manipulation,","domain":"cybersecurity","path":"skills/exploiting-oauth-misconfiguration"},{"name":"exploiting-prototype-pollution-in-javascript","description":"Detect and exploit JavaScript prototype pollution vulnerabilities on both client-side and server-side applications","domain":"cybersecurity","path":"skills/exploiting-prototype-pollution-in-javascript"},{"name":"exploiting-race-condition-vulnerabilities","description":"Detect and exploit race condition vulnerabilities in web applications using Turbo Intruder's single-packet attack","domain":"cybersecurity","path":"skills/exploiting-race-condition-vulnerabilities"},{"name":"exploiting-server-side-request-forgery","description":"Identifying and exploiting SSRF vulnerabilities to access internal services, cloud metadata, and restricted network","domain":"cybersecurity","path":"skills/exploiting-server-side-request-forgery"},{"name":"exploiting-smb-vulnerabilities-with-metasploit","description":"'Identifies and exploits SMB protocol vulnerabilities using Metasploit Framework during authorized penetration","domain":"cybersecurity","path":"skills/exploiting-smb-vulnerabilities-with-metasploit"},{"name":"exploiting-sql-injection-vulnerabilities","description":"'Identifies and exploits SQL injection vulnerabilities in web applications during authorized penetration tests","domain":"cybersecurity","path":"skills/exploiting-sql-injection-vulnerabilities"},{"name":"exploiting-sql-injection-with-sqlmap","description":"Detecting and exploiting SQL injection vulnerabilities using sqlmap to extract database contents during authorized","domain":"cybersecurity","path":"skills/exploiting-sql-injection-with-sqlmap"},{"name":"exploiting-template-injection-vulnerabilities","description":"Detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities across Jinja2, Twig, Freemarker,","domain":"cybersecurity","path":"skills/exploiting-template-injection-vulnerabilities"},{"name":"exploiting-type-juggling-vulnerabilities","description":"Exploit PHP type juggling vulnerabilities caused by loose comparison operators to bypass authentication, circumvent","domain":"cybersecurity","path":"skills/exploiting-type-juggling-vulnerabilities"},{"name":"exploiting-vulnerabilities-with-metasploit-framework","description":"The Metasploit Framework is the world's most widely used penetration testing platform, maintained by Rapid7.","domain":"cybersecurity","path":"skills/exploiting-vulnerabilities-with-metasploit-framework"},{"name":"exploiting-websocket-vulnerabilities","description":"Testing WebSocket implementations for authentication bypass, cross-site hijacking, injection attacks, and insecure","domain":"cybersecurity","path":"skills/exploiting-websocket-vulnerabilities"},{"name":"exploiting-zerologon-vulnerability-cve-2020-1472","description":"Exploit the Zerologon vulnerability (CVE-2020-1472) in the Netlogon Remote Protocol to achieve domain controller","domain":"cybersecurity","path":"skills/exploiting-zerologon-vulnerability-cve-2020-1472"},{"name":"extracting-browser-history-artifacts","description":"Extract and analyze browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge","domain":"cybersecurity","path":"skills/extracting-browser-history-artifacts"},{"name":"extracting-config-from-agent-tesla-rat","description":"Extract embedded configuration from Agent Tesla RAT samples including SMTP/FTP/Telegram exfiltration credentials,","domain":"cybersecurity","path":"skills/extracting-config-from-agent-tesla-rat"},{"name":"extracting-credentials-from-memory-dump","description":"Extract cached credentials, password hashes, Kerberos tickets, and authentication tokens from memory dumps using","domain":"cybersecurity","path":"skills/extracting-credentials-from-memory-dump"},{"name":"extracting-iocs-from-malware-samples","description":"'Extracts indicators of compromise (IOCs) from malware samples including file hashes, network indicators (IPs,","domain":"cybersecurity","path":"skills/extracting-iocs-from-malware-samples"},{"name":"extracting-memory-artifacts-with-rekall","description":"'Uses Rekall memory forensics framework to analyze memory dumps for process hollowing, injected code via VAD","domain":"cybersecurity","path":"skills/extracting-memory-artifacts-with-rekall"},{"name":"extracting-windows-event-logs-artifacts","description":"Extract, parse, and analyze Windows Event Logs (EVTX) using Chainsaw, Hayabusa, and EvtxECmd to detect lateral","domain":"cybersecurity","path":"skills/extracting-windows-event-logs-artifacts"},{"name":"generating-threat-intelligence-reports","description":"'Generates structured cyber threat intelligence reports at strategic, operational, and tactical levels tailored","domain":"cybersecurity","path":"skills/generating-threat-intelligence-reports"},{"name":"hardening-docker-containers-for-production","description":"Hardening Docker containers for production involves applying security best practices aligned with CIS Docker","domain":"cybersecurity","path":"skills/hardening-docker-containers-for-production"},{"name":"hardening-docker-daemon-configuration","description":"Harden the Docker daemon by configuring daemon.json with user namespace remapping, TLS authentication, rootless","domain":"cybersecurity","path":"skills/hardening-docker-daemon-configuration"},{"name":"hardening-linux-endpoint-with-cis-benchmark","description":"'Hardens Linux endpoints using CIS Benchmark recommendations for Ubuntu, RHEL, and CentOS to reduce attack surface,","domain":"cybersecurity","path":"skills/hardening-linux-endpoint-with-cis-benchmark"},{"name":"hardening-windows-endpoint-with-cis-benchmark","description":"'Hardens Windows endpoints using CIS (Center for Internet Security) Benchmark recommendations to reduce attack","domain":"cybersecurity","path":"skills/hardening-windows-endpoint-with-cis-benchmark"},{"name":"hunting-advanced-persistent-threats","description":"'Proactively hunts for Advanced Persistent Threat (APT) activity within enterprise environments using hypothesis-driven","domain":"cybersecurity","path":"skills/hunting-advanced-persistent-threats"},{"name":"hunting-credential-stuffing-attacks","description":"'Detects credential stuffing attacks by analyzing authentication logs for login velocity anomalies, ASN diversity,","domain":"cybersecurity","path":"skills/hunting-credential-stuffing-attacks"},{"name":"hunting-for-anomalous-powershell-execution","description":"'Hunt for malicious PowerShell activity by analyzing Script Block Logging (Event 4104), Module Logging (Event","domain":"cybersecurity","path":"skills/hunting-for-anomalous-powershell-execution"},{"name":"hunting-for-beaconing-with-frequency-analysis","description":"Identify command-and-control beaconing patterns in network traffic by applying statistical frequency analysis,","domain":"cybersecurity","path":"skills/hunting-for-beaconing-with-frequency-analysis"},{"name":"hunting-for-cobalt-strike-beacons","description":"Detect Cobalt Strike beacon network activity using default TLS certificate signatures (serial 8BB00EE), JA3/JA3S/JARM","domain":"cybersecurity","path":"skills/hunting-for-cobalt-strike-beacons"},{"name":"hunting-for-command-and-control-beaconing","description":"Detect C2 beaconing patterns in network traffic using frequency analysis, jitter detection, and domain reputation","domain":"cybersecurity","path":"skills/hunting-for-command-and-control-beaconing"},{"name":"hunting-for-data-exfiltration-indicators","description":"Hunt for data exfiltration through network traffic analysis, detecting unusual data flows, DNS tunneling, cloud","domain":"cybersecurity","path":"skills/hunting-for-data-exfiltration-indicators"},{"name":"hunting-for-data-staging-before-exfiltration","description":"Detect data staging activity before exfiltration by monitoring for archive creation with 7-Zip/RAR, unusual temp","domain":"cybersecurity","path":"skills/hunting-for-data-staging-before-exfiltration"},{"name":"hunting-for-dcom-lateral-movement","description":"'Hunt for DCOM-based lateral movement by detecting abuse of MMC20.Application, ShellBrowserWindow, and ShellWindows","domain":"cybersecurity","path":"skills/hunting-for-dcom-lateral-movement"},{"name":"hunting-for-dcsync-attacks","description":"Detect DCSync attacks by analyzing Windows Event ID 4662 for unauthorized DS-Replication-Get-Changes requests","domain":"cybersecurity","path":"skills/hunting-for-dcsync-attacks"},{"name":"hunting-for-defense-evasion-via-timestomping","description":"'Detect NTFS timestamp manipulation (MITRE T1070.006) by comparing $STANDARD_INFORMATION vs $FILE_NAME timestamps","domain":"cybersecurity","path":"skills/hunting-for-defense-evasion-via-timestomping"},{"name":"hunting-for-dns-based-persistence","description":"Hunt for DNS-based persistence mechanisms including DNS hijacking, dangling CNAME records, wildcard DNS abuse,","domain":"cybersecurity","path":"skills/hunting-for-dns-based-persistence"},{"name":"hunting-for-dns-tunneling-with-zeek","description":"Detect DNS tunneling and data exfiltration by analyzing Zeek dns.log for high-entropy subdomain queries, excessive","domain":"cybersecurity","path":"skills/hunting-for-dns-tunneling-with-zeek"},{"name":"hunting-for-domain-fronting-c2-traffic","description":"Detect domain fronting C2 traffic by analyzing SNI vs HTTP Host header mismatches in proxy logs and TLS certificate","domain":"cybersecurity","path":"skills/hunting-for-domain-fronting-c2-traffic"},{"name":"hunting-for-lateral-movement-via-wmi","description":"Detect WMI-based lateral movement by analyzing Windows Event ID 4688 process creation and Sysmon Event ID 1 for","domain":"cybersecurity","path":"skills/hunting-for-lateral-movement-via-wmi"},{"name":"hunting-for-living-off-the-cloud-techniques","description":"Hunt for adversary abuse of legitimate cloud services for C2, data staging, and exfiltration including abuse","domain":"cybersecurity","path":"skills/hunting-for-living-off-the-cloud-techniques"},{"name":"hunting-for-living-off-the-land-binaries","description":"Proactively hunt for adversary abuse of legitimate system binaries (LOLBins) to execute malicious payloads while","domain":"cybersecurity","path":"skills/hunting-for-living-off-the-land-binaries"},{"name":"hunting-for-lolbins-execution-in-endpoint-logs","description":"Hunt for adversary abuse of Living Off the Land Binaries (LOLBins) by analyzing endpoint process creation logs","domain":"cybersecurity","path":"skills/hunting-for-lolbins-execution-in-endpoint-logs"},{"name":"hunting-for-ntlm-relay-attacks","description":"Detect NTLM relay attacks by analyzing Windows Event 4624 logon type 3 with NTLMSSP authentication, identifying","domain":"cybersecurity","path":"skills/hunting-for-ntlm-relay-attacks"},{"name":"hunting-for-persistence-mechanisms-in-windows","description":"Systematically hunt for adversary persistence mechanisms across Windows endpoints including registry, services,","domain":"cybersecurity","path":"skills/hunting-for-persistence-mechanisms-in-windows"},{"name":"hunting-for-persistence-via-wmi-subscriptions","description":"Hunt for adversary persistence through Windows Management Instrumentation event subscriptions by monitoring WMI","domain":"cybersecurity","path":"skills/hunting-for-persistence-via-wmi-subscriptions"},{"name":"hunting-for-process-injection-techniques","description":"Detect process injection techniques (T1055) including CreateRemoteThread, process hollowing, and DLL injection","domain":"cybersecurity","path":"skills/hunting-for-process-injection-techniques"},{"name":"hunting-for-registry-persistence-mechanisms","description":"Hunt for registry-based persistence mechanisms including Run keys, Winlogon modifications, IFEO injection, and","domain":"cybersecurity","path":"skills/hunting-for-registry-persistence-mechanisms"},{"name":"hunting-for-registry-run-key-persistence","description":"Detect MITRE ATT&CK T1547.001 registry Run key persistence by analyzing Sysmon Event ID 13 logs and registry","domain":"cybersecurity","path":"skills/hunting-for-registry-run-key-persistence"},{"name":"hunting-for-scheduled-task-persistence","description":"Hunt for adversary persistence via Windows Scheduled Tasks by analyzing task creation events, suspicious task","domain":"cybersecurity","path":"skills/hunting-for-scheduled-task-persistence"},{"name":"hunting-for-shadow-copy-deletion","description":"Hunt for Volume Shadow Copy deletion activity that indicates ransomware preparation or anti-forensics by monitoring","domain":"cybersecurity","path":"skills/hunting-for-shadow-copy-deletion"},{"name":"hunting-for-spearphishing-indicators","description":"Hunt for spearphishing campaign indicators across email logs, endpoint telemetry, and network data to detect","domain":"cybersecurity","path":"skills/hunting-for-spearphishing-indicators"},{"name":"hunting-for-startup-folder-persistence","description":"Detect T1547.001 startup folder persistence by monitoring Windows startup directories for suspicious file creation,","domain":"cybersecurity","path":"skills/hunting-for-startup-folder-persistence"},{"name":"hunting-for-supply-chain-compromise","description":"Hunt for supply chain compromise indicators including trojanized software updates, compromised dependencies,","domain":"cybersecurity","path":"skills/hunting-for-supply-chain-compromise"},{"name":"hunting-for-suspicious-scheduled-tasks","description":"Hunt for adversary persistence and execution via Windows scheduled tasks by analyzing task creation events, suspicious","domain":"cybersecurity","path":"skills/hunting-for-suspicious-scheduled-tasks"},{"name":"hunting-for-t1098-account-manipulation","description":"Hunt for MITRE ATT&CK T1098 account manipulation including shadow admin creation, SID history injection, group","domain":"cybersecurity","path":"skills/hunting-for-t1098-account-manipulation"},{"name":"hunting-for-unusual-network-connections","description":"Hunt for unusual network connections by analyzing outbound traffic patterns, rare destinations, non-standard","domain":"cybersecurity","path":"skills/hunting-for-unusual-network-connections"},{"name":"hunting-for-unusual-service-installations","description":"Detect suspicious Windows service installations (MITRE ATT&CK T1543.003) by parsing System event logs for Event","domain":"cybersecurity","path":"skills/hunting-for-unusual-service-installations"},{"name":"hunting-for-webshell-activity","description":"Hunt for web shell deployments on internet-facing servers by analyzing file creation in web directories, suspicious","domain":"cybersecurity","path":"skills/hunting-for-webshell-activity"},{"name":"implementing-aes-encryption-for-data-at-rest","description":"AES (Advanced Encryption Standard) is a symmetric block cipher standardized by NIST (FIPS 197) used to protect","domain":"cybersecurity","path":"skills/implementing-aes-encryption-for-data-at-rest"},{"name":"implementing-alert-fatigue-reduction","description":"'Implements strategies to reduce SOC alert fatigue by tuning detection rules, consolidating duplicate alerts,","domain":"cybersecurity","path":"skills/implementing-alert-fatigue-reduction"},{"name":"implementing-anti-phishing-training-program","description":"Security awareness training is the human layer of phishing defense. An effective anti-phishing training program","domain":"cybersecurity","path":"skills/implementing-anti-phishing-training-program"},{"name":"implementing-anti-ransomware-group-policy","description":"'Configures Windows Group Policy Objects (GPO) to prevent ransomware execution and limit its spread. Implements","domain":"cybersecurity","path":"skills/implementing-anti-ransomware-group-policy"},{"name":"implementing-api-abuse-detection-with-rate-limiting","description":"Implement API abuse detection using token bucket, sliding window, and adaptive rate limiting algorithms to prevent","domain":"cybersecurity","path":"skills/implementing-api-abuse-detection-with-rate-limiting"},{"name":"implementing-api-gateway-security-controls","description":"'Implements security controls at the API gateway layer including authentication enforcement, rate limiting, request","domain":"cybersecurity","path":"skills/implementing-api-gateway-security-controls"},{"name":"implementing-api-key-security-controls","description":"'Implements secure API key generation, storage, rotation, and revocation controls to protect API authentication","domain":"cybersecurity","path":"skills/implementing-api-key-security-controls"},{"name":"implementing-api-rate-limiting-and-throttling","description":"'Implements API rate limiting and throttling controls using token bucket, sliding window, and fixed window algorithms","domain":"cybersecurity","path":"skills/implementing-api-rate-limiting-and-throttling"},{"name":"implementing-api-schema-validation-security","description":"Implement API schema validation using OpenAPI specifications and JSON Schema to enforce input/output contracts","domain":"cybersecurity","path":"skills/implementing-api-schema-validation-security"},{"name":"implementing-api-security-posture-management","description":"Implement API Security Posture Management to continuously discover, classify, and score APIs based on risk while","domain":"cybersecurity","path":"skills/implementing-api-security-posture-management"},{"name":"implementing-api-security-testing-with-42crunch","description":"Implement comprehensive API security testing using the 42Crunch platform to perform static audit and dynamic","domain":"cybersecurity","path":"skills/implementing-api-security-testing-with-42crunch"},{"name":"implementing-api-threat-protection-with-apigee","description":"Implement API threat protection using Google Apigee policies including JSON/XML threat protection, OAuth 2.0,","domain":"cybersecurity","path":"skills/implementing-api-threat-protection-with-apigee"},{"name":"implementing-application-whitelisting-with-applocker","description":"'Implements application whitelisting using Windows AppLocker to restrict unauthorized software execution on endpoints,","domain":"cybersecurity","path":"skills/implementing-application-whitelisting-with-applocker"},{"name":"implementing-aqua-security-for-container-scanning","description":"Deploy Aqua Security's Trivy scanner to detect vulnerabilities, misconfigurations, secrets, and license issues","domain":"cybersecurity","path":"skills/implementing-aqua-security-for-container-scanning"},{"name":"implementing-attack-path-analysis-with-xm-cyber","description":"Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize","domain":"cybersecurity","path":"skills/implementing-attack-path-analysis-with-xm-cyber"},{"name":"implementing-attack-surface-management","description":"'Implements external attack surface management (EASM) using Shodan, Censys, and ProjectDiscovery tools (subfinder,","domain":"cybersecurity","path":"skills/implementing-attack-surface-management"},{"name":"implementing-aws-config-rules-for-compliance","description":"'Implementing AWS Config rules for continuous compliance monitoring of AWS resources, deploying managed and custom","domain":"cybersecurity","path":"skills/implementing-aws-config-rules-for-compliance"},{"name":"implementing-aws-iam-permission-boundaries","description":"Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege","domain":"cybersecurity","path":"skills/implementing-aws-iam-permission-boundaries"},{"name":"implementing-aws-macie-for-data-classification","description":"Implement Amazon Macie to automatically discover, classify, and protect sensitive data in S3 buckets using machine","domain":"cybersecurity","path":"skills/implementing-aws-macie-for-data-classification"},{"name":"implementing-aws-nitro-enclave-security","description":"'Implements AWS Nitro Enclave-based confidential computing environments with cryptographic attestation, KMS policy","domain":"cybersecurity","path":"skills/implementing-aws-nitro-enclave-security"},{"name":"implementing-aws-security-hub","description":"'This skill covers deploying AWS Security Hub as a centralized cloud security posture management platform that","domain":"cybersecurity","path":"skills/implementing-aws-security-hub"},{"name":"implementing-aws-security-hub-compliance","description":"'Implementing AWS Security Hub to aggregate security findings across AWS accounts, enable compliance standards","domain":"cybersecurity","path":"skills/implementing-aws-security-hub-compliance"},{"name":"implementing-azure-ad-privileged-identity-management","description":"Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approval workflows,","domain":"cybersecurity","path":"skills/implementing-azure-ad-privileged-identity-management"},{"name":"implementing-azure-defender-for-cloud","description":"'Implementing Microsoft Defender for Cloud to enable cloud security posture management, workload protection across","domain":"cybersecurity","path":"skills/implementing-azure-defender-for-cloud"},{"name":"implementing-beyondcorp-zero-trust-access-model","description":"'Implementing Google''s BeyondCorp zero trust access model to eliminate implicit trust from the network perimeter,","domain":"cybersecurity","path":"skills/implementing-beyondcorp-zero-trust-access-model"},{"name":"implementing-bgp-security-with-rpki","description":"Implement BGP route origin validation using RPKI with Route Origin Authorizations, RPKI-to-Router protocol, and","domain":"cybersecurity","path":"skills/implementing-bgp-security-with-rpki"},{"name":"implementing-browser-isolation-for-zero-trust","description":"'Deploys remote browser isolation (RBI) as a core component of a Zero Trust architecture. Implements isolation","domain":"cybersecurity","path":"skills/implementing-browser-isolation-for-zero-trust"},{"name":"implementing-canary-tokens-for-network-intrusion","description":"'Deploys DNS, HTTP, and AWS API key canary tokens across network infrastructure to detect unauthorized access","domain":"cybersecurity","path":"skills/implementing-canary-tokens-for-network-intrusion"},{"name":"implementing-cisa-zero-trust-maturity-model","description":"Implement the CISA Zero Trust Maturity Model v2.0 across the five pillars of identity, devices, networks, applications,","domain":"cybersecurity","path":"skills/implementing-cisa-zero-trust-maturity-model"},{"name":"implementing-cloud-dlp-for-data-protection","description":"'Implementing Cloud Data Loss Prevention (DLP) using Amazon Macie, Azure Information Protection, and Google Cloud","domain":"cybersecurity","path":"skills/implementing-cloud-dlp-for-data-protection"},{"name":"implementing-cloud-security-posture-management","description":"'Implementing Cloud Security Posture Management (CSPM) to continuously monitor multi-cloud environments for misconfigurations,","domain":"cybersecurity","path":"skills/implementing-cloud-security-posture-management"},{"name":"implementing-cloud-trail-log-analysis","description":"'Implementing AWS CloudTrail log analysis for security monitoring, threat detection, and forensic investigation","domain":"cybersecurity","path":"skills/implementing-cloud-trail-log-analysis"},{"name":"implementing-cloud-vulnerability-posture-management","description":"Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source","domain":"cybersecurity","path":"skills/implementing-cloud-vulnerability-posture-management"},{"name":"implementing-cloud-waf-rules","description":"'This skill covers deploying and tuning Web Application Firewall rules on AWS WAF, Azure WAF, and Cloudflare","domain":"cybersecurity","path":"skills/implementing-cloud-waf-rules"},{"name":"implementing-cloud-workload-protection","description":"'Implements cloud workload protection using boto3 and google-cloud APIs for runtime security monitoring, process","domain":"cybersecurity","path":"skills/implementing-cloud-workload-protection"},{"name":"implementing-code-signing-for-artifacts","description":"'This skill covers implementing code signing for build artifacts to ensure integrity and authenticity throughout","domain":"cybersecurity","path":"skills/implementing-code-signing-for-artifacts"},{"name":"implementing-conditional-access-policies-azure-ad","description":"Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based","domain":"cybersecurity","path":"skills/implementing-conditional-access-policies-azure-ad"},{"name":"implementing-conduit-security-for-ot-remote-access","description":"'Implement secure conduit architecture for OT remote access following IEC 62443 zones and conduits model, deploying","domain":"cybersecurity","path":"skills/implementing-conduit-security-for-ot-remote-access"},{"name":"implementing-container-image-minimal-base-with-distroless","description":"Reduce container attack surface by building application images on Google distroless base images that contain","domain":"cybersecurity","path":"skills/implementing-container-image-minimal-base-with-distroless"},{"name":"implementing-container-network-policies-with-calico","description":"Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control","domain":"cybersecurity","path":"skills/implementing-container-network-policies-with-calico"},{"name":"implementing-continuous-security-validation-with-bas","description":"Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating","domain":"cybersecurity","path":"skills/implementing-continuous-security-validation-with-bas"},{"name":"implementing-data-loss-prevention-with-microsoft-purview","description":"'Implements data loss prevention policies using Microsoft Purview to protect sensitive information across Exchange","domain":"cybersecurity","path":"skills/implementing-data-loss-prevention-with-microsoft-purview"},{"name":"implementing-ddos-mitigation-with-cloudflare","description":"Configure Cloudflare DDoS protection with managed rulesets, rate limiting, WAF rules, Bot Management, and origin","domain":"cybersecurity","path":"skills/implementing-ddos-mitigation-with-cloudflare"},{"name":"implementing-deception-based-detection-with-canarytoken","description":"Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug","domain":"cybersecurity","path":"skills/implementing-deception-based-detection-with-canarytoken"},{"name":"implementing-delinea-secret-server-for-pam","description":"'Implements Delinea Secret Server for privileged access management (PAM) including secret vault configuration,","domain":"cybersecurity","path":"skills/implementing-delinea-secret-server-for-pam"},{"name":"implementing-device-posture-assessment-in-zero-trust","description":"'Implementing device posture assessment as a zero trust access control by integrating endpoint health signals","domain":"cybersecurity","path":"skills/implementing-device-posture-assessment-in-zero-trust"},{"name":"implementing-devsecops-security-scanning","description":"'Integrates Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software","domain":"cybersecurity","path":"skills/implementing-devsecops-security-scanning"},{"name":"implementing-diamond-model-analysis","description":"The Diamond Model of Intrusion Analysis provides a structured framework for analyzing cyber intrusions by examining","domain":"cybersecurity","path":"skills/implementing-diamond-model-analysis"},{"name":"implementing-digital-signatures-with-ed25519","description":"Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit","domain":"cybersecurity","path":"skills/implementing-digital-signatures-with-ed25519"},{"name":"implementing-disk-encryption-with-bitlocker","description":"'Implements full disk encryption using Microsoft BitLocker on Windows endpoints to protect data at rest from","domain":"cybersecurity","path":"skills/implementing-disk-encryption-with-bitlocker"},{"name":"implementing-dmarc-dkim-spf-email-security","description":"SPF, DKIM, and DMARC form the three pillars of email authentication. Together they prevent domain spoofing, validate","domain":"cybersecurity","path":"skills/implementing-dmarc-dkim-spf-email-security"},{"name":"implementing-dragos-platform-for-ot-monitoring","description":"'Deploy and configure the Dragos Platform for OT network monitoring, leveraging its 600+ industrial protocol","domain":"cybersecurity","path":"skills/implementing-dragos-platform-for-ot-monitoring"},{"name":"implementing-ebpf-security-monitoring","description":"'Implements eBPF-based security monitoring using Cilium Tetragon for real-time process execution tracking, network","domain":"cybersecurity","path":"skills/implementing-ebpf-security-monitoring"},{"name":"implementing-email-sandboxing-with-proofpoint","description":"Email sandboxing detonates suspicious attachments and URLs in isolated environments to detect zero-day malware","domain":"cybersecurity","path":"skills/implementing-email-sandboxing-with-proofpoint"},{"name":"implementing-end-to-end-encryption-for-messaging","description":"End-to-end encryption (E2EE) ensures that only the communicating parties can read messages, with no intermediary","domain":"cybersecurity","path":"skills/implementing-end-to-end-encryption-for-messaging"},{"name":"implementing-endpoint-detection-with-wazuh","description":"Deploy and configure Wazuh SIEM/XDR for endpoint detection including agent management, custom decoder and rule","domain":"cybersecurity","path":"skills/implementing-endpoint-detection-with-wazuh"},{"name":"implementing-endpoint-dlp-controls","description":"'Implements endpoint Data Loss Prevention (DLP) controls to detect and prevent sensitive data exfiltration through","domain":"cybersecurity","path":"skills/implementing-endpoint-dlp-controls"},{"name":"implementing-envelope-encryption-with-aws-kms","description":"Envelope encryption is a strategy where data is encrypted with a data encryption key (DEK), and the DEK itself","domain":"cybersecurity","path":"skills/implementing-envelope-encryption-with-aws-kms"},{"name":"implementing-epss-score-for-vulnerability-prioritization","description":"Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based","domain":"cybersecurity","path":"skills/implementing-epss-score-for-vulnerability-prioritization"},{"name":"implementing-file-integrity-monitoring-with-aide","description":"Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation,","domain":"cybersecurity","path":"skills/implementing-file-integrity-monitoring-with-aide"},{"name":"implementing-fuzz-testing-in-cicd-with-aflplusplus","description":"Integrate AFL++ coverage-guided fuzz testing into CI/CD pipelines to discover memory corruption, input handling,","domain":"cybersecurity","path":"skills/implementing-fuzz-testing-in-cicd-with-aflplusplus"},{"name":"implementing-gcp-binary-authorization","description":"Implement GCP Binary Authorization to enforce deploy-time security controls that ensure only trusted, attested","domain":"cybersecurity","path":"skills/implementing-gcp-binary-authorization"},{"name":"implementing-gcp-organization-policy-constraints","description":"Implement GCP Organization Policy constraints to enforce security guardrails across the entire resource hierarchy,","domain":"cybersecurity","path":"skills/implementing-gcp-organization-policy-constraints"},{"name":"implementing-gcp-vpc-firewall-rules","description":"'Implementing and auditing GCP VPC firewall rules to enforce network segmentation, restrict ingress and egress","domain":"cybersecurity","path":"skills/implementing-gcp-vpc-firewall-rules"},{"name":"implementing-gdpr-data-protection-controls","description":"The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing","domain":"cybersecurity","path":"skills/implementing-gdpr-data-protection-controls"},{"name":"implementing-gdpr-data-subject-access-request","description":"'Automates GDPR Data Subject Access Request (DSAR) workflows including identity verification, PII discovery across","domain":"cybersecurity","path":"skills/implementing-gdpr-data-subject-access-request"},{"name":"implementing-github-advanced-security-for-code-scanning","description":"Configure GitHub Advanced Security with CodeQL to perform automated static analysis and vulnerability detection","domain":"cybersecurity","path":"skills/implementing-github-advanced-security-for-code-scanning"},{"name":"implementing-google-workspace-admin-security","description":"'Implements comprehensive Google Workspace security hardening including admin console configuration, phishing-resistant","domain":"cybersecurity","path":"skills/implementing-google-workspace-admin-security"},{"name":"implementing-google-workspace-phishing-protection","description":"Configure Google Workspace advanced phishing and malware protection settings including pre-delivery scanning,","domain":"cybersecurity","path":"skills/implementing-google-workspace-phishing-protection"},{"name":"implementing-google-workspace-sso-configuration","description":"Configure SAML 2.0 single sign-on for Google Workspace with a third-party identity provider, enabling centralized","domain":"cybersecurity","path":"skills/implementing-google-workspace-sso-configuration"},{"name":"implementing-hardware-security-key-authentication","description":"'Implements FIDO2/WebAuthn hardware security key authentication including registration ceremonies, authentication","domain":"cybersecurity","path":"skills/implementing-hardware-security-key-authentication"},{"name":"implementing-hashicorp-vault-dynamic-secrets","description":"'Implements HashiCorp Vault dynamic secrets engines for database credentials, AWS IAM keys, and PKI certificates","domain":"cybersecurity","path":"skills/implementing-hashicorp-vault-dynamic-secrets"},{"name":"implementing-honeypot-for-ransomware-detection","description":"'Deploys canary files, honeypot shares, and decoy systems to detect ransomware activity at the earliest possible","domain":"cybersecurity","path":"skills/implementing-honeypot-for-ransomware-detection"},{"name":"implementing-honeytokens-for-breach-detection","description":"'Deploys canary tokens and honeytokens (fake AWS credentials, DNS canaries, document beacons, database records)","domain":"cybersecurity","path":"skills/implementing-honeytokens-for-breach-detection"},{"name":"implementing-ics-firewall-with-tofino","description":"'Deploy and configure Tofino industrial firewalls from Belden/Hirschmann to protect SCADA systems and PLCs using","domain":"cybersecurity","path":"skills/implementing-ics-firewall-with-tofino"},{"name":"implementing-identity-governance-with-sailpoint","description":"Deploy SailPoint IdentityNow or IdentityIQ for identity governance and administration. Covers identity lifecycle","domain":"cybersecurity","path":"skills/implementing-identity-governance-with-sailpoint"},{"name":"implementing-identity-verification-for-zero-trust","description":"Implement continuous identity verification for zero trust using phishing-resistant MFA (FIDO2/WebAuthn), risk-based","domain":"cybersecurity","path":"skills/implementing-identity-verification-for-zero-trust"},{"name":"implementing-iec-62443-security-zones","description":"'This skill covers designing and implementing security zones and conduits for industrial automation and control","domain":"cybersecurity","path":"skills/implementing-iec-62443-security-zones"},{"name":"implementing-image-provenance-verification-with-cosign","description":"Sign and verify container image provenance using Sigstore Cosign with keyless OIDC-based signing, attestations,","domain":"cybersecurity","path":"skills/implementing-image-provenance-verification-with-cosign"},{"name":"implementing-immutable-backup-with-restic","description":"'Implements immutable backup strategy using restic with S3-compatible storage and object lock for ransomware-resistant","domain":"cybersecurity","path":"skills/implementing-immutable-backup-with-restic"},{"name":"implementing-infrastructure-as-code-security-scanning","description":"'This skill covers implementing automated security scanning for Infrastructure as Code (IaC) templates using","domain":"cybersecurity","path":"skills/implementing-infrastructure-as-code-security-scanning"},{"name":"implementing-iso-27001-information-security-management","description":"ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). This skill covers the complete","domain":"cybersecurity","path":"skills/implementing-iso-27001-information-security-management"},{"name":"implementing-just-in-time-access-provisioning","description":"Implement Just-In-Time (JIT) access provisioning to eliminate standing privileges by granting temporary, time-bound","domain":"cybersecurity","path":"skills/implementing-just-in-time-access-provisioning"},{"name":"implementing-jwt-signing-and-verification","description":"JSON Web Tokens (JWT) defined in RFC 7519 are compact, URL-safe tokens used for authentication and authorization","domain":"cybersecurity","path":"skills/implementing-jwt-signing-and-verification"},{"name":"implementing-kubernetes-network-policy-with-calico","description":"Implement Kubernetes network segmentation using Calico NetworkPolicy and GlobalNetworkPolicy for zero-trust pod-to-pod","domain":"cybersecurity","path":"skills/implementing-kubernetes-network-policy-with-calico"},{"name":"implementing-kubernetes-pod-security-standards","description":"Pod Security Standards (PSS) define three levels of security policies -- Privileged, Baseline, and Restricted","domain":"cybersecurity","path":"skills/implementing-kubernetes-pod-security-standards"},{"name":"implementing-llm-guardrails-for-security","description":"'Implements input and output validation guardrails for LLM-powered applications to prevent prompt injection,","domain":"cybersecurity","path":"skills/implementing-llm-guardrails-for-security"},{"name":"implementing-log-forwarding-with-fluentd","description":"Configure Fluentd and Fluent Bit for centralized log aggregation, routing, filtering, and enrichment across distributed","domain":"cybersecurity","path":"skills/implementing-log-forwarding-with-fluentd"},{"name":"implementing-log-integrity-with-blockchain","description":"Build an append-only log integrity chain using SHA-256 hash chaining for tamper detection. Each log entry is","domain":"cybersecurity","path":"skills/implementing-log-integrity-with-blockchain"},{"name":"implementing-memory-protection-with-dep-aslr","description":"'Implements memory protection mechanisms including DEP (Data Execution Prevention), ASLR (Address Space Layout","domain":"cybersecurity","path":"skills/implementing-memory-protection-with-dep-aslr"},{"name":"implementing-microsegmentation-with-guardicore","description":"'Implementing microsegmentation using Akamai Guardicore Segmentation to map application dependencies, create","domain":"cybersecurity","path":"skills/implementing-microsegmentation-with-guardicore"},{"name":"implementing-mimecast-targeted-attack-protection","description":"Deploy Mimecast Targeted Threat Protection including URL Protect, Attachment Protect, Impersonation Protect,","domain":"cybersecurity","path":"skills/implementing-mimecast-targeted-attack-protection"},{"name":"implementing-mitre-attack-coverage-mapping","description":"Implement MITRE ATT&CK coverage mapping to identify detection gaps, prioritize rule development, and measure","domain":"cybersecurity","path":"skills/implementing-mitre-attack-coverage-mapping"},{"name":"implementing-mobile-application-management","description":"'Implements Mobile Application Management (MAM) policies to protect enterprise data on managed and unmanaged","domain":"cybersecurity","path":"skills/implementing-mobile-application-management"},{"name":"implementing-mtls-for-zero-trust-services","description":"'Configures mutual TLS (mTLS) authentication between microservices using Python cryptography library for certificate","domain":"cybersecurity","path":"skills/implementing-mtls-for-zero-trust-services"},{"name":"implementing-nerc-cip-compliance-controls","description":"'This skill covers implementing North American Electric Reliability Corporation Critical Infrastructure Protection","domain":"cybersecurity","path":"skills/implementing-nerc-cip-compliance-controls"},{"name":"implementing-network-access-control","description":"'Implements 802.1X port-based network access control using RADIUS authentication, PacketFence NAC, and switch","domain":"cybersecurity","path":"skills/implementing-network-access-control"},{"name":"implementing-network-access-control-with-cisco-ise","description":"Deploy Cisco Identity Services Engine for 802.1X wired and wireless authentication, MAC Authentication Bypass,","domain":"cybersecurity","path":"skills/implementing-network-access-control-with-cisco-ise"},{"name":"implementing-network-deception-with-honeypots","description":"Deploy and manage network honeypots using OpenCanary, T-Pot, or Cowrie to detect unauthorized access, lateral","domain":"cybersecurity","path":"skills/implementing-network-deception-with-honeypots"},{"name":"implementing-network-intrusion-prevention-with-suricata","description":"Deploy and configure Suricata as a network intrusion prevention system with custom rules, Emerging Threats rulesets,","domain":"cybersecurity","path":"skills/implementing-network-intrusion-prevention-with-suricata"},{"name":"implementing-network-policies-for-kubernetes","description":"Kubernetes NetworkPolicies provide pod-level network segmentation by defining ingress and egress rules that control","domain":"cybersecurity","path":"skills/implementing-network-policies-for-kubernetes"},{"name":"implementing-network-segmentation-for-ot","description":"'This skill covers implementing network segmentation in Operational Technology environments using VLANs, industrial","domain":"cybersecurity","path":"skills/implementing-network-segmentation-for-ot"},{"name":"implementing-network-segmentation-with-firewall-zones","description":"Design and implement network segmentation using firewall security zones, VLANs, ACLs, and microsegmentation policies","domain":"cybersecurity","path":"skills/implementing-network-segmentation-with-firewall-zones"},{"name":"implementing-network-traffic-analysis-with-arkime","description":"Deploy and query Arkime (formerly Moloch) for full packet capture network traffic analysis. Uses the Arkime API","domain":"cybersecurity","path":"skills/implementing-network-traffic-analysis-with-arkime"},{"name":"implementing-network-traffic-baselining","description":"Build network traffic baselines from NetFlow/IPFIX data using Python pandas for statistical analysis, z-score","domain":"cybersecurity","path":"skills/implementing-network-traffic-baselining"},{"name":"implementing-next-generation-firewall-with-palo-alto","description":"Configure and deploy Palo Alto Networks next-generation firewalls with App-ID, User-ID, zone-based policies,","domain":"cybersecurity","path":"skills/implementing-next-generation-firewall-with-palo-alto"},{"name":"implementing-opa-gatekeeper-for-policy-enforcement","description":"Enforce Kubernetes admission policies using OPA Gatekeeper with ConstraintTemplates, Rego rules, and the Gatekeeper","domain":"cybersecurity","path":"skills/implementing-opa-gatekeeper-for-policy-enforcement"},{"name":"implementing-ot-incident-response-playbook","description":"'Develop and implement OT-specific incident response playbooks aligned with SANS PICERL framework, IEC 62443,","domain":"cybersecurity","path":"skills/implementing-ot-incident-response-playbook"},{"name":"implementing-ot-network-traffic-analysis-with-nozomi","description":"'Deploy Nozomi Networks Guardian sensors for passive OT network traffic analysis to achieve comprehensive asset","domain":"cybersecurity","path":"skills/implementing-ot-network-traffic-analysis-with-nozomi"},{"name":"implementing-pam-for-database-access","description":"Deploy privileged access management for database systems including Oracle, SQL Server, PostgreSQL, and MySQL.","domain":"cybersecurity","path":"skills/implementing-pam-for-database-access"},{"name":"implementing-passwordless-auth-with-microsoft-entra","description":"'Implements passwordless authentication using Microsoft Entra ID with FIDO2 security keys, Windows Hello for","domain":"cybersecurity","path":"skills/implementing-passwordless-auth-with-microsoft-entra"},{"name":"implementing-passwordless-authentication-with-fido2","description":"Deploy FIDO2/WebAuthn passwordless authentication using security keys and platform authenticators. Covers WebAuthn","domain":"cybersecurity","path":"skills/implementing-passwordless-authentication-with-fido2"},{"name":"implementing-patch-management-for-ot-systems","description":"'This skill covers implementing a structured patch management program for OT/ICS environments where traditional","domain":"cybersecurity","path":"skills/implementing-patch-management-for-ot-systems"},{"name":"implementing-patch-management-workflow","description":"Patch management is the systematic process of identifying, testing, deploying, and verifying software updates","domain":"cybersecurity","path":"skills/implementing-patch-management-workflow"},{"name":"implementing-pci-dss-compliance-controls","description":"PCI DSS 4.0.1 establishes 12 requirements across 6 control objectives for organizations that store, process, or transmit cardholder data. With PCI DSS 3.2.1 retiring April 2024 and 51 new requirements","domain":"cybersecurity","path":"skills/implementing-pci-dss-compliance-controls"},{"name":"implementing-pod-security-admission-controller","description":"Implement Kubernetes Pod Security Admission to enforce baseline and restricted security profiles at namespace","domain":"cybersecurity","path":"skills/implementing-pod-security-admission-controller"},{"name":"implementing-policy-as-code-with-open-policy-agent","description":"'This skill covers implementing Open Policy Agent (OPA) and Gatekeeper for policy-as-code enforcement in Kubernetes","domain":"cybersecurity","path":"skills/implementing-policy-as-code-with-open-policy-agent"},{"name":"implementing-privileged-access-management-with-cyberark","description":"Deploy CyberArk Privileged Access Management to discover, vault, rotate, and monitor privileged credentials across","domain":"cybersecurity","path":"skills/implementing-privileged-access-management-with-cyberark"},{"name":"implementing-privileged-access-workstation","description":"Design and implement Privileged Access Workstations (PAWs) with device hardening, just-in-time access, and integration","domain":"cybersecurity","path":"skills/implementing-privileged-access-workstation"},{"name":"implementing-privileged-session-monitoring","description":"'Implements privileged session monitoring and recording using Privileged Access Management (PAM) solutions, focusing","domain":"cybersecurity","path":"skills/implementing-privileged-session-monitoring"},{"name":"implementing-proofpoint-email-security-gateway","description":"Deploy and configure Proofpoint Email Protection as a secure email gateway to detect and block phishing, malware,","domain":"cybersecurity","path":"skills/implementing-proofpoint-email-security-gateway"},{"name":"implementing-purdue-model-network-segmentation","description":"'Implement network segmentation based on the Purdue Enterprise Reference Architecture (PERA) model to separate","domain":"cybersecurity","path":"skills/implementing-purdue-model-network-segmentation"},{"name":"implementing-ransomware-backup-strategy","description":"'Designs and implements a ransomware-resilient backup strategy following the 3-2-1-1-0 methodology (3 copies,","domain":"cybersecurity","path":"skills/implementing-ransomware-backup-strategy"},{"name":"implementing-ransomware-kill-switch-detection","description":"'Detects and exploits ransomware kill switch mechanisms including mutex-based execution guards, domain-based","domain":"cybersecurity","path":"skills/implementing-ransomware-kill-switch-detection"},{"name":"implementing-rapid7-insightvm-for-scanning","description":"Deploy and configure Rapid7 InsightVM Security Console and Scan Engines for authenticated and unauthenticated","domain":"cybersecurity","path":"skills/implementing-rapid7-insightvm-for-scanning"},{"name":"implementing-rbac-hardening-for-kubernetes","description":"Harden Kubernetes Role-Based Access Control by implementing least-privilege policies, auditing role bindings,","domain":"cybersecurity","path":"skills/implementing-rbac-hardening-for-kubernetes"},{"name":"implementing-rsa-key-pair-management","description":"RSA (Rivest-Shamir-Adleman) is the most widely deployed asymmetric cryptographic algorithm, used for digital","domain":"cybersecurity","path":"skills/implementing-rsa-key-pair-management"},{"name":"implementing-runtime-application-self-protection","description":"Deploy Runtime Application Self-Protection (RASP) agents to detect and block attacks from within application","domain":"cybersecurity","path":"skills/implementing-runtime-application-self-protection"},{"name":"implementing-runtime-security-with-tetragon","description":"Implement eBPF-based runtime security observability and enforcement in Kubernetes clusters using Cilium Tetragon","domain":"cybersecurity","path":"skills/implementing-runtime-security-with-tetragon"},{"name":"implementing-saml-sso-with-okta","description":"Implement SAML 2.0 Single Sign-On (SSO) using Okta as the Identity Provider (IdP). This skill covers end-to-end","domain":"cybersecurity","path":"skills/implementing-saml-sso-with-okta"},{"name":"implementing-scim-provisioning-with-okta","description":"Implement automated user provisioning and deprovisioning using SCIM 2.0 protocol with Okta as the identity provider.","domain":"cybersecurity","path":"skills/implementing-scim-provisioning-with-okta"},{"name":"implementing-secret-scanning-with-gitleaks","description":"'This skill covers implementing Gitleaks for detecting and preventing hardcoded secrets in git repositories.","domain":"cybersecurity","path":"skills/implementing-secret-scanning-with-gitleaks"},{"name":"implementing-secrets-management-with-vault","description":"'This skill covers deploying HashiCorp Vault for centralized secrets management across cloud environments, including","domain":"cybersecurity","path":"skills/implementing-secrets-management-with-vault"},{"name":"implementing-secrets-scanning-in-ci-cd","description":"Integrate gitleaks and trufflehog into CI/CD pipelines to detect leaked secrets before deployment","domain":"cybersecurity","path":"skills/implementing-secrets-scanning-in-ci-cd"},{"name":"implementing-security-chaos-engineering","description":"'Implements security chaos engineering experiments that deliberately disable or degrade security controls to","domain":"cybersecurity","path":"skills/implementing-security-chaos-engineering"},{"name":"implementing-security-information-sharing-with-stix2","description":"'Create, validate, and share STIX 2.1 threat intelligence objects using the stix2 Python library. Covers indicators,","domain":"cybersecurity","path":"skills/implementing-security-information-sharing-with-stix2"},{"name":"implementing-security-monitoring-with-datadog","description":"'Implements security monitoring using Datadog Cloud SIEM, Cloud Security Management (CSM), and Workload Protection","domain":"cybersecurity","path":"skills/implementing-security-monitoring-with-datadog"},{"name":"implementing-semgrep-for-custom-sast-rules","description":"Write custom Semgrep SAST rules in YAML to detect application-specific vulnerabilities, enforce coding standards,","domain":"cybersecurity","path":"skills/implementing-semgrep-for-custom-sast-rules"},{"name":"implementing-siem-correlation-rules-for-apt","description":"Write multi-event correlation rules that detect APT lateral movement by chaining Windows authentication events,","domain":"cybersecurity","path":"skills/implementing-siem-correlation-rules-for-apt"},{"name":"implementing-siem-use-case-tuning","description":"Tune SIEM detection rules to reduce false positives by analyzing alert volumes, creating whitelists, adjusting","domain":"cybersecurity","path":"skills/implementing-siem-use-case-tuning"},{"name":"implementing-siem-use-cases-for-detection","description":"'Implements SIEM detection use cases by designing correlation rules, threshold alerts, and behavioral analytics","domain":"cybersecurity","path":"skills/implementing-siem-use-cases-for-detection"},{"name":"implementing-sigstore-for-software-signing","description":"'Implements Sigstore-based software signing and verification using Cosign keyless signing, Rekor transparency","domain":"cybersecurity","path":"skills/implementing-sigstore-for-software-signing"},{"name":"implementing-soar-automation-with-phantom","description":"'Implements Security Orchestration, Automation, and Response (SOAR) workflows using Splunk SOAR (formerly Phantom)","domain":"cybersecurity","path":"skills/implementing-soar-automation-with-phantom"},{"name":"implementing-soar-playbook-for-phishing","description":"Automate phishing incident response using Splunk SOAR REST API to create containers, add artifacts, and trigger","domain":"cybersecurity","path":"skills/implementing-soar-playbook-for-phishing"},{"name":"implementing-soar-playbook-with-palo-alto-xsoar","description":"Implement automated incident response playbooks in Cortex XSOAR to orchestrate security workflows across SOC","domain":"cybersecurity","path":"skills/implementing-soar-playbook-with-palo-alto-xsoar"},{"name":"implementing-stix-taxii-feed-integration","description":"STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated eXchange of Intelligence Information)","domain":"cybersecurity","path":"skills/implementing-stix-taxii-feed-integration"},{"name":"implementing-supply-chain-security-with-in-toto","description":"Implement software supply chain integrity verification for container builds using the in-toto framework to create","domain":"cybersecurity","path":"skills/implementing-supply-chain-security-with-in-toto"},{"name":"implementing-syslog-centralization-with-rsyslog","description":"Configure rsyslog for centralized log collection with TLS encryption, custom templates, and log rotation. Generates","domain":"cybersecurity","path":"skills/implementing-syslog-centralization-with-rsyslog"},{"name":"implementing-taxii-server-with-opentaxii","description":"Deploy and configure an OpenTAXII server to share and consume STIX-formatted cyber threat intelligence using","domain":"cybersecurity","path":"skills/implementing-taxii-server-with-opentaxii"},{"name":"implementing-threat-intelligence-lifecycle-management","description":"Implement a structured threat intelligence lifecycle encompassing planning, collection, processing, analysis,","domain":"cybersecurity","path":"skills/implementing-threat-intelligence-lifecycle-management"},{"name":"implementing-threat-modeling-with-mitre-attack","description":"'Implements threat modeling using the MITRE ATT&CK framework to map adversary TTPs against organizational assets,","domain":"cybersecurity","path":"skills/implementing-threat-modeling-with-mitre-attack"},{"name":"implementing-ticketing-system-for-incidents","description":"'Implements an integrated incident ticketing system connecting SIEM alerts to ServiceNow, Jira, or TheHive for","domain":"cybersecurity","path":"skills/implementing-ticketing-system-for-incidents"},{"name":"implementing-usb-device-control-policy","description":"'Implements USB device control policies to restrict unauthorized removable media access on endpoints, preventing","domain":"cybersecurity","path":"skills/implementing-usb-device-control-policy"},{"name":"implementing-velociraptor-for-ir-collection","description":"Deploy and configure Velociraptor for scalable endpoint forensic artifact collection during incident response","domain":"cybersecurity","path":"skills/implementing-velociraptor-for-ir-collection"},{"name":"implementing-vulnerability-management-with-greenbone","description":"Deploy and operate Greenbone/OpenVAS vulnerability management using the python-gvm library to create scan targets,","domain":"cybersecurity","path":"skills/implementing-vulnerability-management-with-greenbone"},{"name":"implementing-vulnerability-remediation-sla","description":"Vulnerability remediation SLAs define mandatory timeframes for patching or mitigating identified vulnerabilities","domain":"cybersecurity","path":"skills/implementing-vulnerability-remediation-sla"},{"name":"implementing-vulnerability-sla-breach-alerting","description":"Build automated alerting for vulnerability remediation SLA breaches with severity-based timelines, escalation","domain":"cybersecurity","path":"skills/implementing-vulnerability-sla-breach-alerting"},{"name":"implementing-web-application-logging-with-modsecurity","description":"'Configure ModSecurity WAF with OWASP Core Rule Set (CRS) for web application logging, tune rules to reduce false","domain":"cybersecurity","path":"skills/implementing-web-application-logging-with-modsecurity"},{"name":"implementing-zero-knowledge-proof-for-authentication","description":"Zero-Knowledge Proofs (ZKPs) allow a prover to demonstrate knowledge of a secret (such as a password or private","domain":"cybersecurity","path":"skills/implementing-zero-knowledge-proof-for-authentication"},{"name":"implementing-zero-standing-privilege-with-cyberark","description":"Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using","domain":"cybersecurity","path":"skills/implementing-zero-standing-privilege-with-cyberark"},{"name":"implementing-zero-trust-dns-with-nextdns","description":"Implement NextDNS as a zero trust DNS filtering layer with encrypted resolution, threat intelligence blocking,","domain":"cybersecurity","path":"skills/implementing-zero-trust-dns-with-nextdns"},{"name":"implementing-zero-trust-for-saas-applications","description":"'Implementing zero trust access controls for SaaS applications using CASB, SSPM, conditional access policies,","domain":"cybersecurity","path":"skills/implementing-zero-trust-for-saas-applications"},{"name":"implementing-zero-trust-in-cloud","description":"'This skill guides organizations through implementing zero trust architecture in cloud environments following","domain":"cybersecurity","path":"skills/implementing-zero-trust-in-cloud"},{"name":"implementing-zero-trust-network-access","description":"'Implementing Zero Trust Network Access (ZTNA) in cloud environments by configuring identity-aware proxies, micro-segmentation,","domain":"cybersecurity","path":"skills/implementing-zero-trust-network-access"},{"name":"implementing-zero-trust-network-access-with-zscaler","description":"Implement Zero Trust Network Access using Zscaler Private Access (ZPA) to replace traditional VPN with identity-based,","domain":"cybersecurity","path":"skills/implementing-zero-trust-network-access-with-zscaler"},{"name":"implementing-zero-trust-with-beyondcorp","description":"Deploy Google BeyondCorp Enterprise zero trust access controls using Identity-Aware Proxy (IAP), context-aware","domain":"cybersecurity","path":"skills/implementing-zero-trust-with-beyondcorp"},{"name":"implementing-zero-trust-with-hashicorp-boundary","description":"Implement HashiCorp Boundary for identity-aware zero trust infrastructure access management with dynamic credential","domain":"cybersecurity","path":"skills/implementing-zero-trust-with-hashicorp-boundary"},{"name":"integrating-dast-with-owasp-zap-in-pipeline","description":"'This skill covers integrating OWASP ZAP (Zed Attack Proxy) for Dynamic Application Security Testing in CI/CD","domain":"cybersecurity","path":"skills/integrating-dast-with-owasp-zap-in-pipeline"},{"name":"integrating-sast-into-github-actions-pipeline","description":"'This skill covers integrating Static Application Security Testing (SAST) tools\u2014CodeQL and Semgrep\u2014into GitHub","domain":"cybersecurity","path":"skills/integrating-sast-into-github-actions-pipeline"},{"name":"intercepting-mobile-traffic-with-burpsuite","description":"'Intercepts and analyzes HTTP/HTTPS traffic from mobile applications using Burp Suite proxy to identify insecure","domain":"cybersecurity","path":"skills/intercepting-mobile-traffic-with-burpsuite"},{"name":"investigating-insider-threat-indicators","description":"'Investigates insider threat indicators including data exfiltration attempts, unauthorized access patterns, policy","domain":"cybersecurity","path":"skills/investigating-insider-threat-indicators"},{"name":"investigating-phishing-email-incident","description":"'Investigates phishing email incidents from initial user report through header analysis, URL/attachment detonation,","domain":"cybersecurity","path":"skills/investigating-phishing-email-incident"},{"name":"investigating-ransomware-attack-artifacts","description":"Identify, collect, and analyze ransomware attack artifacts to determine the variant, initial access vector, encryption","domain":"cybersecurity","path":"skills/investigating-ransomware-attack-artifacts"},{"name":"managing-cloud-identity-with-okta","description":"'This skill covers implementing Okta as a centralized identity provider for cloud environments, configuring SSO","domain":"cybersecurity","path":"skills/managing-cloud-identity-with-okta"},{"name":"managing-intelligence-lifecycle","description":"'Manages the end-to-end cyber threat intelligence lifecycle from planning and direction through collection, processing,","domain":"cybersecurity","path":"skills/managing-intelligence-lifecycle"},{"name":"mapping-mitre-attack-techniques","description":"'Maps observed adversary behaviors, security alerts, and detection rules to MITRE ATT&CK techniques and sub-techniques","domain":"cybersecurity","path":"skills/mapping-mitre-attack-techniques"},{"name":"monitoring-darkweb-sources","description":"'Monitors dark web forums, marketplaces, paste sites, and ransomware leak sites for mentions of organizational","domain":"cybersecurity","path":"skills/monitoring-darkweb-sources"},{"name":"monitoring-scada-modbus-traffic-anomalies","description":"'Monitors Modbus TCP traffic on SCADA and ICS networks to detect anomalous function code usage, unauthorized","domain":"cybersecurity","path":"skills/monitoring-scada-modbus-traffic-anomalies"},{"name":"performing-access-recertification-with-saviynt","description":"Configure and execute access recertification campaigns in Saviynt Enterprise Identity Cloud to validate user","domain":"cybersecurity","path":"skills/performing-access-recertification-with-saviynt"},{"name":"performing-access-review-and-certification","description":"Conduct systematic access reviews and certifications to ensure users have appropriate access rights aligned with","domain":"cybersecurity","path":"skills/performing-access-review-and-certification"},{"name":"performing-active-directory-bloodhound-analysis","description":"Use BloodHound and SharpHound to enumerate Active Directory relationships and identify attack paths from compromised","domain":"cybersecurity","path":"skills/performing-active-directory-bloodhound-analysis"},{"name":"performing-active-directory-compromise-investigation","description":"Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy","domain":"cybersecurity","path":"skills/performing-active-directory-compromise-investigation"},{"name":"performing-active-directory-forest-trust-attack","description":"Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust","domain":"cybersecurity","path":"skills/performing-active-directory-forest-trust-attack"},{"name":"performing-active-directory-penetration-test","description":"Conduct a focused Active Directory penetration test to enumerate domain objects, discover attack paths with BloodHound,","domain":"cybersecurity","path":"skills/performing-active-directory-penetration-test"},{"name":"performing-active-directory-vulnerability-assessment","description":"Assess Active Directory security posture using PingCastle, BloodHound, and Purple Knight to identify misconfigurations,","domain":"cybersecurity","path":"skills/performing-active-directory-vulnerability-assessment"},{"name":"performing-adversary-in-the-middle-phishing-detection","description":"Detect and respond to Adversary-in-the-Middle (AiTM) phishing attacks that use reverse proxy kits like EvilProxy,","domain":"cybersecurity","path":"skills/performing-adversary-in-the-middle-phishing-detection"},{"name":"performing-agentless-vulnerability-scanning","description":"Configure and execute agentless vulnerability scanning using network protocols, cloud snapshot analysis, and","domain":"cybersecurity","path":"skills/performing-agentless-vulnerability-scanning"},{"name":"performing-ai-driven-osint-correlation","description":"Use AI and LLM-based reasoning to correlate findings across multiple OSINT sources\u2014username enumeration, email","domain":"cybersecurity","path":"skills/performing-ai-driven-osint-correlation"},{"name":"performing-alert-triage-with-elastic-siem","description":"Perform systematic alert triage in Elastic Security SIEM to rapidly classify, prioritize, and investigate security","domain":"cybersecurity","path":"skills/performing-alert-triage-with-elastic-siem"},{"name":"performing-android-app-static-analysis-with-mobsf","description":"'Performs automated static analysis of Android applications using Mobile Security Framework (MobSF) to identify","domain":"cybersecurity","path":"skills/performing-android-app-static-analysis-with-mobsf"},{"name":"performing-api-fuzzing-with-restler","description":"'Uses Microsoft RESTler to perform stateful REST API fuzzing by automatically generating and executing test sequences","domain":"cybersecurity","path":"skills/performing-api-fuzzing-with-restler"},{"name":"performing-api-inventory-and-discovery","description":"'Performs API inventory and discovery to identify all API endpoints in an organization''s environment including","domain":"cybersecurity","path":"skills/performing-api-inventory-and-discovery"},{"name":"performing-api-rate-limiting-bypass","description":"'Tests API rate limiting implementations for bypass vulnerabilities by manipulating request headers, IP addresses,","domain":"cybersecurity","path":"skills/performing-api-rate-limiting-bypass"},{"name":"performing-api-security-testing-with-postman","description":"'Uses Postman to perform structured API security testing by building collections that test for OWASP API Security","domain":"cybersecurity","path":"skills/performing-api-security-testing-with-postman"},{"name":"performing-arp-spoofing-attack-simulation","description":"'Simulates ARP spoofing attacks in authorized lab or pentest environments using arpspoof, Ettercap, and Scapy","domain":"cybersecurity","path":"skills/performing-arp-spoofing-attack-simulation"},{"name":"performing-asset-criticality-scoring-for-vulns","description":"Develop and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization based","domain":"cybersecurity","path":"skills/performing-asset-criticality-scoring-for-vulns"},{"name":"performing-authenticated-scan-with-openvas","description":"Configure and execute authenticated vulnerability scans using OpenVAS/Greenbone Vulnerability Management with","domain":"cybersecurity","path":"skills/performing-authenticated-scan-with-openvas"},{"name":"performing-authenticated-vulnerability-scan","description":"Authenticated (credentialed) vulnerability scanning uses valid system credentials to log into target hosts and","domain":"cybersecurity","path":"skills/performing-authenticated-vulnerability-scan"},{"name":"performing-automated-malware-analysis-with-cape","description":"Deploy and operate CAPEv2 sandbox for automated malware analysis with behavioral monitoring, payload extraction,","domain":"cybersecurity","path":"skills/performing-automated-malware-analysis-with-cape"},{"name":"performing-aws-account-enumeration-with-scout-suite","description":"Perform comprehensive security posture assessment of AWS accounts using ScoutSuite to enumerate resources, identify","domain":"cybersecurity","path":"skills/performing-aws-account-enumeration-with-scout-suite"},{"name":"performing-aws-privilege-escalation-assessment","description":"'Performing authorized privilege escalation assessments in AWS environments to identify IAM misconfigurations","domain":"cybersecurity","path":"skills/performing-aws-privilege-escalation-assessment"},{"name":"performing-bandwidth-throttling-attack-simulation","description":"'Simulates bandwidth throttling and network degradation attacks using tc, iperf3, and Scapy in authorized environments","domain":"cybersecurity","path":"skills/performing-bandwidth-throttling-attack-simulation"},{"name":"performing-binary-exploitation-analysis","description":"'Analyze binary exploitation techniques including buffer overflows and ROP chains using pwntools Python library.","domain":"cybersecurity","path":"skills/performing-binary-exploitation-analysis"},{"name":"performing-blind-ssrf-exploitation","description":"Detect and exploit blind Server-Side Request Forgery vulnerabilities using out-of-band techniques, DNS interactions,","domain":"cybersecurity","path":"skills/performing-blind-ssrf-exploitation"},{"name":"performing-bluetooth-security-assessment","description":"Assess Bluetooth Low Energy device security by scanning, enumerating GATT services, and detecting vulnerabilities","domain":"cybersecurity","path":"skills/performing-bluetooth-security-assessment"},{"name":"performing-brand-monitoring-for-impersonation","description":"Monitor for brand impersonation attacks across domains, social media, mobile apps, and dark web channels to detect","domain":"cybersecurity","path":"skills/performing-brand-monitoring-for-impersonation"},{"name":"performing-clickjacking-attack-test","description":"Testing web applications for clickjacking vulnerabilities by assessing frame embedding controls and crafting","domain":"cybersecurity","path":"skills/performing-clickjacking-attack-test"},{"name":"performing-cloud-asset-inventory-with-cartography","description":"Perform comprehensive cloud asset inventory and relationship mapping using Cartography to build a Neo4j security","domain":"cybersecurity","path":"skills/performing-cloud-asset-inventory-with-cartography"},{"name":"performing-cloud-forensics-investigation","description":"Conduct forensic investigations in cloud environments by collecting and analyzing logs, snapshots, and metadata","domain":"cybersecurity","path":"skills/performing-cloud-forensics-investigation"},{"name":"performing-cloud-forensics-with-aws-cloudtrail","description":"Perform forensic investigation of AWS environments using CloudTrail logs to reconstruct attacker activity, identify","domain":"cybersecurity","path":"skills/performing-cloud-forensics-with-aws-cloudtrail"},{"name":"performing-cloud-incident-containment-procedures","description":"Execute cloud-native incident containment across AWS, Azure, and GCP by isolating compromised resources, revoking","domain":"cybersecurity","path":"skills/performing-cloud-incident-containment-procedures"},{"name":"performing-cloud-log-forensics-with-athena","description":"'Uses AWS Athena to query CloudTrail, VPC Flow Logs, S3 access logs, and ALB logs for forensic investigation.","domain":"cybersecurity","path":"skills/performing-cloud-log-forensics-with-athena"},{"name":"performing-cloud-native-forensics-with-falco","description":"'Uses Falco YAML rules for runtime threat detection in containers and Kubernetes, monitoring syscalls for shell","domain":"cybersecurity","path":"skills/performing-cloud-native-forensics-with-falco"},{"name":"performing-cloud-native-threat-hunting-with-aws-detective","description":"Hunt for threats in AWS environments using Detective behavior graphs, entity investigation timelines, GuardDuty","domain":"cybersecurity","path":"skills/performing-cloud-native-threat-hunting-with-aws-detective"},{"name":"performing-cloud-penetration-testing-with-pacu","description":"'Performing authorized AWS penetration testing using Pacu, the open-source AWS exploitation framework, to enumerate","domain":"cybersecurity","path":"skills/performing-cloud-penetration-testing-with-pacu"},{"name":"performing-cloud-storage-forensic-acquisition","description":"Perform forensic acquisition and analysis of cloud storage services including Google Drive, OneDrive, Dropbox,","domain":"cybersecurity","path":"skills/performing-cloud-storage-forensic-acquisition"},{"name":"performing-container-escape-detection","description":"'Detects container escape attempts by analyzing namespace configurations, privileged container checks, dangerous","domain":"cybersecurity","path":"skills/performing-container-escape-detection"},{"name":"performing-container-image-hardening","description":"'This skill covers hardening container images by minimizing attack surface, removing unnecessary packages, implementing","domain":"cybersecurity","path":"skills/performing-container-image-hardening"},{"name":"performing-container-security-scanning-with-trivy","description":"Scan container images, filesystems, and Kubernetes manifests for vulnerabilities, misconfigurations, exposed","domain":"cybersecurity","path":"skills/performing-container-security-scanning-with-trivy"},{"name":"performing-content-security-policy-bypass","description":"Analyze and bypass Content Security Policy implementations to achieve cross-site scripting by exploiting misconfigurations,","domain":"cybersecurity","path":"skills/performing-content-security-policy-bypass"},{"name":"performing-credential-access-with-lazagne","description":"Extract stored credentials from compromised endpoints using the LaZagne post-exploitation tool to recover passwords","domain":"cybersecurity","path":"skills/performing-credential-access-with-lazagne"},{"name":"performing-cryptographic-audit-of-application","description":"A cryptographic audit systematically reviews an application's use of cryptographic primitives, protocols, and","domain":"cybersecurity","path":"skills/performing-cryptographic-audit-of-application"},{"name":"performing-csrf-attack-simulation","description":"Testing web applications for Cross-Site Request Forgery vulnerabilities by crafting forged requests that exploit","domain":"cybersecurity","path":"skills/performing-csrf-attack-simulation"},{"name":"performing-cve-prioritization-with-kev-catalog","description":"Leverage the CISA Known Exploited Vulnerabilities catalog alongside EPSS and CVSS to prioritize CVE remediation","domain":"cybersecurity","path":"skills/performing-cve-prioritization-with-kev-catalog"},{"name":"performing-dark-web-monitoring-for-threats","description":"Dark web monitoring involves systematically scanning Tor hidden services, underground forums, paste sites, and","domain":"cybersecurity","path":"skills/performing-dark-web-monitoring-for-threats"},{"name":"performing-deception-technology-deployment","description":"'Deploys deception technology including honeypots, honeytokens, and decoy systems to detect attackers who have","domain":"cybersecurity","path":"skills/performing-deception-technology-deployment"},{"name":"performing-directory-traversal-testing","description":"Testing web applications for path traversal vulnerabilities that allow reading or writing arbitrary files on","domain":"cybersecurity","path":"skills/performing-directory-traversal-testing"},{"name":"performing-disk-forensics-investigation","description":"'Conducts disk forensics investigations using forensic imaging, file system analysis, artifact recovery, and","domain":"cybersecurity","path":"skills/performing-disk-forensics-investigation"},{"name":"performing-dmarc-policy-enforcement-rollout","description":"Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring","domain":"cybersecurity","path":"skills/performing-dmarc-policy-enforcement-rollout"},{"name":"performing-dns-enumeration-and-zone-transfer","description":"'Enumerates DNS records, attempts zone transfers, brute-forces subdomains, and maps DNS infrastructure during","domain":"cybersecurity","path":"skills/performing-dns-enumeration-and-zone-transfer"},{"name":"performing-dns-tunneling-detection","description":"'Detects DNS tunneling by computing Shannon entropy of DNS query names, analyzing query length distributions,","domain":"cybersecurity","path":"skills/performing-dns-tunneling-detection"},{"name":"performing-docker-bench-security-assessment","description":"Docker Bench for Security is an open-source script that checks dozens of common best practices around deploying","domain":"cybersecurity","path":"skills/performing-docker-bench-security-assessment"},{"name":"performing-dynamic-analysis-of-android-app","description":"'Performs runtime dynamic analysis of Android applications using Frida, Objection, and Android Debug Bridge to","domain":"cybersecurity","path":"skills/performing-dynamic-analysis-of-android-app"},{"name":"performing-dynamic-analysis-with-any-run","description":"'Performs interactive dynamic malware analysis using the ANY.RUN cloud sandbox to observe real-time execution","domain":"cybersecurity","path":"skills/performing-dynamic-analysis-with-any-run"},{"name":"performing-endpoint-forensics-investigation","description":"'Performs digital forensics investigation on compromised endpoints including memory acquisition, disk imaging,","domain":"cybersecurity","path":"skills/performing-endpoint-forensics-investigation"},{"name":"performing-endpoint-vulnerability-remediation","description":"'Performs vulnerability remediation on endpoints by prioritizing CVEs based on risk scoring, deploying patches,","domain":"cybersecurity","path":"skills/performing-endpoint-vulnerability-remediation"},{"name":"performing-entitlement-review-with-sailpoint-iiq","description":"'Performs entitlement review and access certification campaigns using SailPoint IdentityIQ including manager","domain":"cybersecurity","path":"skills/performing-entitlement-review-with-sailpoint-iiq"},{"name":"performing-external-network-penetration-test","description":"Conduct a comprehensive external network penetration test to identify vulnerabilities in internet-facing infrastructure","domain":"cybersecurity","path":"skills/performing-external-network-penetration-test"},{"name":"performing-false-positive-reduction-in-siem","description":"Perform systematic SIEM false positive reduction through rule tuning, threshold adjustment, correlation refinement,","domain":"cybersecurity","path":"skills/performing-false-positive-reduction-in-siem"},{"name":"performing-file-carving-with-foremost","description":"Recover files from disk images and unallocated space using Foremost's header-footer signature carving to extract","domain":"cybersecurity","path":"skills/performing-file-carving-with-foremost"},{"name":"performing-firmware-extraction-with-binwalk","description":"'Performs firmware image extraction and analysis using binwalk to identify embedded filesystems, compressed archives,","domain":"cybersecurity","path":"skills/performing-firmware-extraction-with-binwalk"},{"name":"performing-firmware-malware-analysis","description":"'Analyzes firmware images for embedded malware, backdoors, and unauthorized modifications targeting routers,","domain":"cybersecurity","path":"skills/performing-firmware-malware-analysis"},{"name":"performing-fuzzing-with-aflplusplus","description":"'Perform coverage-guided fuzzing of compiled binaries using AFL++ (American Fuzzy Lop Plus Plus) to discover","domain":"cybersecurity","path":"skills/performing-fuzzing-with-aflplusplus"},{"name":"performing-gcp-penetration-testing-with-gcpbucketbrute","description":"Perform GCP security testing using GCPBucketBrute for storage bucket enumeration, gcloud IAM privilege escalation","domain":"cybersecurity","path":"skills/performing-gcp-penetration-testing-with-gcpbucketbrute"},{"name":"performing-gcp-security-assessment-with-forseti","description":"'Performing comprehensive security assessments of Google Cloud Platform environments using Forseti Security,","domain":"cybersecurity","path":"skills/performing-gcp-security-assessment-with-forseti"},{"name":"performing-graphql-depth-limit-attack","description":"Execute and test GraphQL depth limit attacks using deeply nested recursive queries to identify denial-of-service","domain":"cybersecurity","path":"skills/performing-graphql-depth-limit-attack"},{"name":"performing-graphql-introspection-attack","description":"'Performs GraphQL introspection attacks to extract the full API schema including types, queries, mutations, subscriptions,","domain":"cybersecurity","path":"skills/performing-graphql-introspection-attack"},{"name":"performing-graphql-security-assessment","description":"Assessing GraphQL API endpoints for introspection leaks, injection attacks, authorization flaws, and denial-of-service","domain":"cybersecurity","path":"skills/performing-graphql-security-assessment"},{"name":"performing-hardware-security-module-integration","description":"Integrate Hardware Security Modules (HSMs) using PKCS#11 interface for cryptographic key management, signing","domain":"cybersecurity","path":"skills/performing-hardware-security-module-integration"},{"name":"performing-hash-cracking-with-hashcat","description":"Hash cracking is an essential skill for penetration testers and security auditors to evaluate password strength.","domain":"cybersecurity","path":"skills/performing-hash-cracking-with-hashcat"},{"name":"performing-http-parameter-pollution-attack","description":"Execute HTTP Parameter Pollution attacks to bypass input validation, WAF rules, and security controls by injecting","domain":"cybersecurity","path":"skills/performing-http-parameter-pollution-attack"},{"name":"performing-ics-asset-discovery-with-claroty","description":"'Perform comprehensive ICS/OT asset discovery using Claroty xDome platform, leveraging passive monitoring, Claroty","domain":"cybersecurity","path":"skills/performing-ics-asset-discovery-with-claroty"},{"name":"performing-indicator-lifecycle-management","description":"Indicator lifecycle management tracks IOCs from initial discovery through validation, enrichment, deployment,","domain":"cybersecurity","path":"skills/performing-indicator-lifecycle-management"},{"name":"performing-initial-access-with-evilginx3","description":"Perform authorized initial access using EvilGinx3 adversary-in-the-middle phishing framework to capture session","domain":"cybersecurity","path":"skills/performing-initial-access-with-evilginx3"},{"name":"performing-insider-threat-investigation","description":"'Investigates insider threat incidents involving employees, contractors, or trusted partners who misuse authorized","domain":"cybersecurity","path":"skills/performing-insider-threat-investigation"},{"name":"performing-ioc-enrichment-automation","description":"'Automates Indicator of Compromise (IOC) enrichment by orchestrating lookups across VirusTotal, AbuseIPDB, Shodan,","domain":"cybersecurity","path":"skills/performing-ioc-enrichment-automation"},{"name":"performing-ios-app-security-assessment","description":"'Performs comprehensive iOS application security assessments using Frida for dynamic instrumentation, Objection","domain":"cybersecurity","path":"skills/performing-ios-app-security-assessment"},{"name":"performing-iot-security-assessment","description":"'Performs comprehensive security assessments of IoT devices and their ecosystems by testing hardware interfaces,","domain":"cybersecurity","path":"skills/performing-iot-security-assessment"},{"name":"performing-ip-reputation-analysis-with-shodan","description":"Analyze IP address reputation using the Shodan API to identify open ports, running services, known vulnerabilities,","domain":"cybersecurity","path":"skills/performing-ip-reputation-analysis-with-shodan"},{"name":"performing-jwt-none-algorithm-attack","description":"Execute and test the JWT none algorithm attack to bypass signature verification by manipulating the alg header","domain":"cybersecurity","path":"skills/performing-jwt-none-algorithm-attack"},{"name":"performing-kerberoasting-attack","description":"Kerberoasting is a post-exploitation technique that targets service accounts in Active Directory by requesting","domain":"cybersecurity","path":"skills/performing-kerberoasting-attack"},{"name":"performing-kubernetes-cis-benchmark-with-kube-bench","description":"Audit Kubernetes cluster security posture against CIS benchmarks using kube-bench with automated checks for control","domain":"cybersecurity","path":"skills/performing-kubernetes-cis-benchmark-with-kube-bench"},{"name":"performing-kubernetes-etcd-security-assessment","description":"Assess the security posture of Kubernetes etcd clusters by evaluating encryption at rest, TLS configuration,","domain":"cybersecurity","path":"skills/performing-kubernetes-etcd-security-assessment"},{"name":"performing-kubernetes-penetration-testing","description":"Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against","domain":"cybersecurity","path":"skills/performing-kubernetes-penetration-testing"},{"name":"performing-lateral-movement-detection","description":"'Detects lateral movement techniques including Pass-the-Hash, PsExec, WMI execution, RDP pivoting, and SMB-based","domain":"cybersecurity","path":"skills/performing-lateral-movement-detection"},{"name":"performing-lateral-movement-with-wmiexec","description":"Perform lateral movement across Windows networks using WMI-based remote execution techniques including Impacket","domain":"cybersecurity","path":"skills/performing-lateral-movement-with-wmiexec"},{"name":"performing-linux-log-forensics-investigation","description":"Perform forensic investigation of Linux system logs including syslog, auth.log, systemd journal, kern.log, and","domain":"cybersecurity","path":"skills/performing-linux-log-forensics-investigation"},{"name":"performing-log-analysis-for-forensic-investigation","description":"Collect, parse, and correlate system, application, and security logs to reconstruct events and establish timelines","domain":"cybersecurity","path":"skills/performing-log-analysis-for-forensic-investigation"},{"name":"performing-log-source-onboarding-in-siem","description":"Perform structured log source onboarding into SIEM platforms by configuring collectors, parsers, normalization,","domain":"cybersecurity","path":"skills/performing-log-source-onboarding-in-siem"},{"name":"performing-malware-hash-enrichment-with-virustotal","description":"Enrich malware file hashes using the VirusTotal API to retrieve detection rates, behavioral analysis, YARA matches,","domain":"cybersecurity","path":"skills/performing-malware-hash-enrichment-with-virustotal"},{"name":"performing-malware-ioc-extraction","description":"Malware IOC extraction is the process of analyzing malicious software to identify actionable indicators of compromise","domain":"cybersecurity","path":"skills/performing-malware-ioc-extraction"},{"name":"performing-malware-persistence-investigation","description":"Systematically investigate all persistence mechanisms on Windows and Linux systems to identify how malware survives","domain":"cybersecurity","path":"skills/performing-malware-persistence-investigation"},{"name":"performing-malware-triage-with-yara","description":"'Performs rapid malware triage and classification using YARA rules to match file patterns, strings, byte sequences,","domain":"cybersecurity","path":"skills/performing-malware-triage-with-yara"},{"name":"performing-memory-forensics-with-volatility3","description":"Analyze volatile memory dumps using Volatility 3 to extract running processes, network connections, loaded modules,","domain":"cybersecurity","path":"skills/performing-memory-forensics-with-volatility3"},{"name":"performing-memory-forensics-with-volatility3-plugins","description":"Analyze memory dumps using Volatility3 plugins to detect injected code, rootkits, credential theft, and malware","domain":"cybersecurity","path":"skills/performing-memory-forensics-with-volatility3-plugins"},{"name":"performing-mobile-app-certificate-pinning-bypass","description":"'Bypasses SSL/TLS certificate pinning implementations in Android and iOS applications to enable traffic interception","domain":"cybersecurity","path":"skills/performing-mobile-app-certificate-pinning-bypass"},{"name":"performing-mobile-device-forensics-with-cellebrite","description":"Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications,","domain":"cybersecurity","path":"skills/performing-mobile-device-forensics-with-cellebrite"},{"name":"performing-network-forensics-with-wireshark","description":"Capture and analyze network traffic using Wireshark and tshark to reconstruct network events, extract artifacts,","domain":"cybersecurity","path":"skills/performing-network-forensics-with-wireshark"},{"name":"performing-network-packet-capture-analysis","description":"Perform forensic analysis of network packet captures (PCAP/PCAPNG) using Wireshark, tshark, and tcpdump to reconstruct","domain":"cybersecurity","path":"skills/performing-network-packet-capture-analysis"},{"name":"performing-network-traffic-analysis-with-tshark","description":"Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection,","domain":"cybersecurity","path":"skills/performing-network-traffic-analysis-with-tshark"},{"name":"performing-network-traffic-analysis-with-zeek","description":"Deploy Zeek network security monitor to capture, parse, and analyze network traffic metadata for threat detection,","domain":"cybersecurity","path":"skills/performing-network-traffic-analysis-with-zeek"},{"name":"performing-nist-csf-maturity-assessment","description":">-","domain":"cybersecurity","path":"skills/performing-nist-csf-maturity-assessment"},{"name":"performing-oauth-scope-minimization-review","description":"'Performs OAuth 2.0 scope minimization review to identify over-permissioned third-party application integrations,","domain":"cybersecurity","path":"skills/performing-oauth-scope-minimization-review"},{"name":"performing-oil-gas-cybersecurity-assessment","description":"'This skill covers conducting cybersecurity assessments specific to oil and gas facilities including upstream","domain":"cybersecurity","path":"skills/performing-oil-gas-cybersecurity-assessment"},{"name":"performing-open-source-intelligence-gathering","description":"Open Source Intelligence (OSINT) gathering is the first active phase of a red team engagement, where operators","domain":"cybersecurity","path":"skills/performing-open-source-intelligence-gathering"},{"name":"performing-osint-with-spiderfoot","description":"Automate OSINT collection using SpiderFoot REST API and CLI for target profiling, module-based reconnaissance,","domain":"cybersecurity","path":"skills/performing-osint-with-spiderfoot"},{"name":"performing-ot-network-security-assessment","description":"'This skill covers conducting comprehensive security assessments of Operational Technology (OT) networks including","domain":"cybersecurity","path":"skills/performing-ot-network-security-assessment"},{"name":"performing-ot-vulnerability-assessment-with-claroty","description":"'This skill covers performing vulnerability assessments in OT environments using the Claroty xDome platform for","domain":"cybersecurity","path":"skills/performing-ot-vulnerability-assessment-with-claroty"},{"name":"performing-ot-vulnerability-scanning-safely","description":"'Perform vulnerability scanning in OT/ICS environments safely using passive monitoring, native protocol queries,","domain":"cybersecurity","path":"skills/performing-ot-vulnerability-scanning-safely"},{"name":"performing-packet-injection-attack","description":"'Crafts and injects custom network packets using Scapy, hping3, and Nemesis during authorized security assessments","domain":"cybersecurity","path":"skills/performing-packet-injection-attack"},{"name":"performing-paste-site-monitoring-for-credentials","description":"Monitor paste sites like Pastebin and GitHub Gists for leaked credentials, API keys, and sensitive data dumps","domain":"cybersecurity","path":"skills/performing-paste-site-monitoring-for-credentials"},{"name":"performing-phishing-simulation-with-gophish","description":"GoPhish is an open-source phishing simulation framework used by security teams to conduct authorized phishing","domain":"cybersecurity","path":"skills/performing-phishing-simulation-with-gophish"},{"name":"performing-physical-intrusion-assessment","description":"Conduct authorized physical penetration testing using tailgating, badge cloning, lock bypassing, and rogue device","domain":"cybersecurity","path":"skills/performing-physical-intrusion-assessment"},{"name":"performing-plc-firmware-security-analysis","description":"'This skill covers analyzing Programmable Logic Controller (PLC) firmware for security vulnerabilities including","domain":"cybersecurity","path":"skills/performing-plc-firmware-security-analysis"},{"name":"performing-post-quantum-cryptography-migration","description":"'Assesses organizational readiness for post-quantum cryptography migration per NIST FIPS 203/204/205 standards.","domain":"cybersecurity","path":"skills/performing-post-quantum-cryptography-migration"},{"name":"performing-power-grid-cybersecurity-assessment","description":"'This skill covers conducting cybersecurity assessments of electric power grid infrastructure including generation","domain":"cybersecurity","path":"skills/performing-power-grid-cybersecurity-assessment"},{"name":"performing-privacy-impact-assessment","description":"'Automates the Privacy Impact Assessment (PIA) workflow including data flow mapping, privacy risk scoring matrices,","domain":"cybersecurity","path":"skills/performing-privacy-impact-assessment"},{"name":"performing-privilege-escalation-assessment","description":"'Performs privilege escalation assessments on compromised Linux and Windows systems to identify paths from low-privilege","domain":"cybersecurity","path":"skills/performing-privilege-escalation-assessment"},{"name":"performing-privilege-escalation-on-linux","description":"Linux privilege escalation involves elevating from a low-privilege user account to root access on a compromised","domain":"cybersecurity","path":"skills/performing-privilege-escalation-on-linux"},{"name":"performing-privileged-account-access-review","description":"Conduct systematic reviews of privileged accounts to validate access rights, identify excessive permissions,","domain":"cybersecurity","path":"skills/performing-privileged-account-access-review"},{"name":"performing-privileged-account-discovery","description":"Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local","domain":"cybersecurity","path":"skills/performing-privileged-account-discovery"},{"name":"performing-purple-team-atomic-testing","description":"'Executes Atomic Red Team tests mapped to MITRE ATT&CK techniques, performs coverage gap analysis across the","domain":"cybersecurity","path":"skills/performing-purple-team-atomic-testing"},{"name":"performing-purple-team-exercise","description":"'Performs purple team exercises by coordinating red team adversary emulation with blue team detection validation","domain":"cybersecurity","path":"skills/performing-purple-team-exercise"},{"name":"performing-ransomware-response","description":"'Executes a structured ransomware incident response from initial detection through containment, forensic analysis,","domain":"cybersecurity","path":"skills/performing-ransomware-response"},{"name":"performing-ransomware-tabletop-exercise","description":"'Plans and facilitates tabletop exercises simulating ransomware incidents to test organizational readiness, decision-making,","domain":"cybersecurity","path":"skills/performing-ransomware-tabletop-exercise"},{"name":"performing-red-team-phishing-with-gophish","description":"Automate GoPhish phishing simulation campaigns using the Python gophish library. Creates email templates with","domain":"cybersecurity","path":"skills/performing-red-team-phishing-with-gophish"},{"name":"performing-red-team-with-covenant","description":"Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener","domain":"cybersecurity","path":"skills/performing-red-team-with-covenant"},{"name":"performing-s7comm-protocol-security-analysis","description":"'Perform security analysis of Siemens S7comm and S7CommPlus protocols used by SIMATIC S7 PLCs to identify vulnerabilities","domain":"cybersecurity","path":"skills/performing-s7comm-protocol-security-analysis"},{"name":"performing-sca-dependency-scanning-with-snyk","description":"'This skill covers implementing Software Composition Analysis (SCA) using Snyk to detect vulnerable open-source","domain":"cybersecurity","path":"skills/performing-sca-dependency-scanning-with-snyk"},{"name":"performing-scada-hmi-security-assessment","description":"'Perform security assessments of SCADA Human-Machine Interface (HMI) systems to identify vulnerabilities in web-based","domain":"cybersecurity","path":"skills/performing-scada-hmi-security-assessment"},{"name":"performing-second-order-sql-injection","description":"Detect and exploit second-order SQL injection vulnerabilities where malicious input is stored in a database and","domain":"cybersecurity","path":"skills/performing-second-order-sql-injection"},{"name":"performing-security-headers-audit","description":"Auditing HTTP security headers including CSP, HSTS, X-Frame-Options, and cookie attributes to identify missing","domain":"cybersecurity","path":"skills/performing-security-headers-audit"},{"name":"performing-serverless-function-security-review","description":"'Performing security reviews of serverless functions across AWS Lambda, Azure Functions, and GCP Cloud Functions","domain":"cybersecurity","path":"skills/performing-serverless-function-security-review"},{"name":"performing-service-account-audit","description":"Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant","domain":"cybersecurity","path":"skills/performing-service-account-audit"},{"name":"performing-service-account-credential-rotation","description":"Automate credential rotation for service accounts across Active Directory, cloud platforms, and application databases","domain":"cybersecurity","path":"skills/performing-service-account-credential-rotation"},{"name":"performing-soap-web-service-security-testing","description":"Perform security testing of SOAP web services by analyzing WSDL definitions and testing for XML injection, XXE,","domain":"cybersecurity","path":"skills/performing-soap-web-service-security-testing"},{"name":"performing-soc-tabletop-exercise","description":"'Performs tabletop exercises for SOC teams simulating security incidents through discussion-based scenarios to","domain":"cybersecurity","path":"skills/performing-soc-tabletop-exercise"},{"name":"performing-soc2-type2-audit-preparation","description":"'Automates SOC 2 Type II audit preparation including gap assessment against AICPA Trust Services Criteria (CC1-CC9),","domain":"cybersecurity","path":"skills/performing-soc2-type2-audit-preparation"},{"name":"performing-sqlite-database-forensics","description":"Perform forensic analysis of SQLite databases to recover deleted records from freelists and WAL files, decode","domain":"cybersecurity","path":"skills/performing-sqlite-database-forensics"},{"name":"performing-ssl-certificate-lifecycle-management","description":"SSL/TLS certificate lifecycle management encompasses the full process of requesting, issuing, deploying, monitoring,","domain":"cybersecurity","path":"skills/performing-ssl-certificate-lifecycle-management"},{"name":"performing-ssl-stripping-attack","description":"'Simulates SSL stripping attacks using sslstrip, Bettercap, and mitmproxy in authorized environments to test","domain":"cybersecurity","path":"skills/performing-ssl-stripping-attack"},{"name":"performing-ssl-tls-inspection-configuration","description":"Configure SSL/TLS inspection on network security devices to decrypt, inspect, and re-encrypt HTTPS traffic for","domain":"cybersecurity","path":"skills/performing-ssl-tls-inspection-configuration"},{"name":"performing-ssl-tls-security-assessment","description":"Assess SSL/TLS server configurations using the sslyze Python library to evaluate cipher suites, certificate chains,","domain":"cybersecurity","path":"skills/performing-ssl-tls-security-assessment"},{"name":"performing-ssrf-vulnerability-exploitation","description":"Test for Server-Side Request Forgery vulnerabilities by probing cloud metadata endpoints, internal network services,","domain":"cybersecurity","path":"skills/performing-ssrf-vulnerability-exploitation"},{"name":"performing-static-malware-analysis-with-pe-studio","description":"'Performs static analysis of Windows PE (Portable Executable) malware samples using PEStudio to examine file","domain":"cybersecurity","path":"skills/performing-static-malware-analysis-with-pe-studio"},{"name":"performing-steganography-detection","description":"Detect and extract hidden data embedded in images, audio, and other media files using steganalysis tools to uncover","domain":"cybersecurity","path":"skills/performing-steganography-detection"},{"name":"performing-subdomain-enumeration-with-subfinder","description":"Enumerate subdomains of target domains using ProjectDiscovery's Subfinder passive reconnaissance tool to map","domain":"cybersecurity","path":"skills/performing-subdomain-enumeration-with-subfinder"},{"name":"performing-supply-chain-attack-simulation","description":"Simulate and detect software supply chain attacks including typosquatting detection via Levenshtein distance,","domain":"cybersecurity","path":"skills/performing-supply-chain-attack-simulation"},{"name":"performing-thick-client-application-penetration-test","description":"Conduct a thick client application penetration test to identify insecure local storage, hardcoded credentials,","domain":"cybersecurity","path":"skills/performing-thick-client-application-penetration-test"},{"name":"performing-threat-emulation-with-atomic-red-team","description":"'Executes Atomic Red Team tests for MITRE ATT&CK technique validation using the atomic-operator Python framework.","domain":"cybersecurity","path":"skills/performing-threat-emulation-with-atomic-red-team"},{"name":"performing-threat-hunting-with-elastic-siem","description":"'Performs proactive threat hunting in Elastic Security SIEM using KQL/EQL queries, detection rules, and Timeline","domain":"cybersecurity","path":"skills/performing-threat-hunting-with-elastic-siem"},{"name":"performing-threat-hunting-with-yara-rules","description":"'Use YARA pattern-matching rules to hunt for malware, suspicious files, and indicators of compromise across filesystems","domain":"cybersecurity","path":"skills/performing-threat-hunting-with-yara-rules"},{"name":"performing-threat-intelligence-sharing-with-misp","description":"Use PyMISP to create, enrich, and share threat intelligence events on a MISP platform, including IOC management,","domain":"cybersecurity","path":"skills/performing-threat-intelligence-sharing-with-misp"},{"name":"performing-threat-landscape-assessment-for-sector","description":"Conduct a sector-specific threat landscape assessment by analyzing threat actor targeting patterns, common attack","domain":"cybersecurity","path":"skills/performing-threat-landscape-assessment-for-sector"},{"name":"performing-threat-modeling-with-owasp-threat-dragon","description":"Use OWASP Threat Dragon to create data flow diagrams, identify threats using STRIDE and LINDDUN methodologies,","domain":"cybersecurity","path":"skills/performing-threat-modeling-with-owasp-threat-dragon"},{"name":"performing-timeline-reconstruction-with-plaso","description":"Build comprehensive forensic super-timelines using Plaso (log2timeline) to correlate events across file systems,","domain":"cybersecurity","path":"skills/performing-timeline-reconstruction-with-plaso"},{"name":"performing-user-behavior-analytics","description":"'Performs User and Entity Behavior Analytics (UEBA) to detect anomalous user activities including impossible","domain":"cybersecurity","path":"skills/performing-user-behavior-analytics"},{"name":"performing-vlan-hopping-attack","description":"'Simulates VLAN hopping attacks using switch spoofing and double tagging techniques in authorized environments","domain":"cybersecurity","path":"skills/performing-vlan-hopping-attack"},{"name":"performing-vulnerability-scanning-with-nessus","description":"'Performs authenticated and unauthenticated vulnerability scanning using Tenable Nessus to identify known vulnerabilities,","domain":"cybersecurity","path":"skills/performing-vulnerability-scanning-with-nessus"},{"name":"performing-web-application-firewall-bypass","description":"Bypass Web Application Firewall protections using encoding techniques, HTTP method manipulation, parameter pollution,","domain":"cybersecurity","path":"skills/performing-web-application-firewall-bypass"},{"name":"performing-web-application-penetration-test","description":"'Performs systematic security testing of web applications following the OWASP Web Security Testing Guide (WSTG)","domain":"cybersecurity","path":"skills/performing-web-application-penetration-test"},{"name":"performing-web-application-scanning-with-nikto","description":"Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous","domain":"cybersecurity","path":"skills/performing-web-application-scanning-with-nikto"},{"name":"performing-web-application-vulnerability-triage","description":"Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to","domain":"cybersecurity","path":"skills/performing-web-application-vulnerability-triage"},{"name":"performing-web-cache-deception-attack","description":"Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers","domain":"cybersecurity","path":"skills/performing-web-cache-deception-attack"},{"name":"performing-web-cache-poisoning-attack","description":"Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through","domain":"cybersecurity","path":"skills/performing-web-cache-poisoning-attack"},{"name":"performing-wifi-password-cracking-with-aircrack","description":"'Captures WPA/WPA2 handshakes and performs offline password cracking using aircrack-ng, hashcat, and dictionary","domain":"cybersecurity","path":"skills/performing-wifi-password-cracking-with-aircrack"},{"name":"performing-windows-artifact-analysis-with-eric-zimmerman-tools","description":"Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including","domain":"cybersecurity","path":"skills/performing-windows-artifact-analysis-with-eric-zimmerman-tools"},{"name":"performing-wireless-network-penetration-test","description":"Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3","domain":"cybersecurity","path":"skills/performing-wireless-network-penetration-test"},{"name":"performing-wireless-security-assessment-with-kismet","description":"Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak","domain":"cybersecurity","path":"skills/performing-wireless-security-assessment-with-kismet"},{"name":"performing-yara-rule-development-for-detection","description":"Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral","domain":"cybersecurity","path":"skills/performing-yara-rule-development-for-detection"},{"name":"prioritizing-vulnerabilities-with-cvss-scoring","description":"The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum","domain":"cybersecurity","path":"skills/prioritizing-vulnerabilities-with-cvss-scoring"},{"name":"processing-stix-taxii-feeds","description":"'Processes STIX 2.1 threat intelligence bundles delivered via TAXII 2.1 servers, normalizing objects into platform-native","domain":"cybersecurity","path":"skills/processing-stix-taxii-feeds"},{"name":"profiling-threat-actor-groups","description":"'Develops comprehensive threat actor profiles for APT groups, criminal organizations, and hacktivist collectives","domain":"cybersecurity","path":"skills/profiling-threat-actor-groups"},{"name":"recovering-deleted-files-with-photorec","description":"Recover deleted files from disk images and storage media using PhotoRec's file signature-based carving engine","domain":"cybersecurity","path":"skills/recovering-deleted-files-with-photorec"},{"name":"recovering-from-ransomware-attack","description":"'Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment","domain":"cybersecurity","path":"skills/recovering-from-ransomware-attack"},{"name":"remediating-s3-bucket-misconfiguration","description":"'This skill provides step-by-step procedures for identifying and remediating Amazon S3 bucket misconfigurations","domain":"cybersecurity","path":"skills/remediating-s3-bucket-misconfiguration"},{"name":"reverse-engineering-android-malware-with-jadx","description":"'Reverse engineers malicious Android APK files using JADX decompiler to analyze Java/Kotlin source code, identify","domain":"cybersecurity","path":"skills/reverse-engineering-android-malware-with-jadx"},{"name":"reverse-engineering-dotnet-malware-with-dnspy","description":"'Reverse engineers .NET malware using dnSpy decompiler and debugger to analyze C#/VB.NET source code, identify","domain":"cybersecurity","path":"skills/reverse-engineering-dotnet-malware-with-dnspy"},{"name":"reverse-engineering-ios-app-with-frida","description":"'Reverse engineers iOS applications using Frida dynamic instrumentation to understand internal logic, extract","domain":"cybersecurity","path":"skills/reverse-engineering-ios-app-with-frida"},{"name":"reverse-engineering-malware-with-ghidra","description":"'Reverse engineers malware binaries using NSA''s Ghidra disassembler and decompiler to understand internal logic,","domain":"cybersecurity","path":"skills/reverse-engineering-malware-with-ghidra"},{"name":"reverse-engineering-ransomware-encryption-routine","description":"Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and","domain":"cybersecurity","path":"skills/reverse-engineering-ransomware-encryption-routine"},{"name":"reverse-engineering-rust-malware","description":"Reverse engineer Rust-compiled malware using IDA Pro and Ghidra with techniques for handling non-null-terminated","domain":"cybersecurity","path":"skills/reverse-engineering-rust-malware"},{"name":"scanning-container-images-with-grype","description":"Scan container images for known vulnerabilities using Anchore Grype with SBOM-based matching and configurable","domain":"cybersecurity","path":"skills/scanning-container-images-with-grype"},{"name":"scanning-containers-with-trivy-in-cicd","description":"'This skill covers integrating Aqua Security''s Trivy scanner into CI/CD pipelines for comprehensive container","domain":"cybersecurity","path":"skills/scanning-containers-with-trivy-in-cicd"},{"name":"scanning-docker-images-with-trivy","description":"Trivy is a comprehensive open-source vulnerability scanner by Aqua Security that detects vulnerabilities in OS","domain":"cybersecurity","path":"skills/scanning-docker-images-with-trivy"},{"name":"scanning-infrastructure-with-nessus","description":"Tenable Nessus is the industry-leading vulnerability scanner used to identify security weaknesses across network","domain":"cybersecurity","path":"skills/scanning-infrastructure-with-nessus"},{"name":"scanning-kubernetes-manifests-with-kubesec","description":"Perform security risk analysis on Kubernetes resource manifests using Kubesec to identify misconfigurations,","domain":"cybersecurity","path":"skills/scanning-kubernetes-manifests-with-kubesec"},{"name":"scanning-network-with-nmap-advanced","description":"'Performs advanced network reconnaissance using Nmap''s scripting engine, timing controls, evasion techniques,","domain":"cybersecurity","path":"skills/scanning-network-with-nmap-advanced"},{"name":"securing-api-gateway-with-aws-waf","description":"'Securing API Gateway endpoints with AWS WAF by configuring managed rule groups for OWASP Top 10 protection,","domain":"cybersecurity","path":"skills/securing-api-gateway-with-aws-waf"},{"name":"securing-aws-iam-permissions","description":"'This skill guides practitioners through hardening AWS Identity and Access Management configurations to enforce","domain":"cybersecurity","path":"skills/securing-aws-iam-permissions"},{"name":"securing-aws-lambda-execution-roles","description":"'Securing AWS Lambda execution roles by implementing least-privilege IAM policies, applying permission boundaries,","domain":"cybersecurity","path":"skills/securing-aws-lambda-execution-roles"},{"name":"securing-azure-with-microsoft-defender","description":"'This skill instructs security practitioners on deploying Microsoft Defender for Cloud as a cloud-native application","domain":"cybersecurity","path":"skills/securing-azure-with-microsoft-defender"},{"name":"securing-container-registry-images","description":"'Securing container registry images by implementing vulnerability scanning with Trivy and Grype, enforcing image","domain":"cybersecurity","path":"skills/securing-container-registry-images"},{"name":"securing-container-registry-with-harbor","description":"Harbor is an open-source container registry that provides security features including vulnerability scanning","domain":"cybersecurity","path":"skills/securing-container-registry-with-harbor"},{"name":"securing-github-actions-workflows","description":"'This skill covers hardening GitHub Actions workflows against supply chain attacks, credential theft, and privilege","domain":"cybersecurity","path":"skills/securing-github-actions-workflows"},{"name":"securing-helm-chart-deployments","description":"Secure Helm chart deployments by validating chart integrity, scanning templates for misconfigurations, and enforcing","domain":"cybersecurity","path":"skills/securing-helm-chart-deployments"},{"name":"securing-historian-server-in-ot-environment","description":"'This skill covers hardening and securing process historian servers (OSIsoft PI, Honeywell PHD, GE Proficy, AVEVA","domain":"cybersecurity","path":"skills/securing-historian-server-in-ot-environment"},{"name":"securing-kubernetes-on-cloud","description":"'This skill covers hardening managed Kubernetes clusters on EKS, AKS, and GKE by implementing Pod Security Standards,","domain":"cybersecurity","path":"skills/securing-kubernetes-on-cloud"},{"name":"securing-remote-access-to-ot-environment","description":"'This skill covers implementing secure remote access to OT/ICS environments for operators, engineers, and vendors","domain":"cybersecurity","path":"skills/securing-remote-access-to-ot-environment"},{"name":"securing-serverless-functions","description":"'This skill covers security hardening for serverless compute platforms including AWS Lambda, Azure Functions,","domain":"cybersecurity","path":"skills/securing-serverless-functions"},{"name":"testing-android-intents-for-vulnerabilities","description":"'Tests Android inter-process communication (IPC) through intents for vulnerabilities including intent injection,","domain":"cybersecurity","path":"skills/testing-android-intents-for-vulnerabilities"},{"name":"testing-api-authentication-weaknesses","description":"'Tests API authentication mechanisms for weaknesses including broken token validation, missing authentication","domain":"cybersecurity","path":"skills/testing-api-authentication-weaknesses"},{"name":"testing-api-for-broken-object-level-authorization","description":"'Tests REST and GraphQL APIs for Broken Object Level Authorization (BOLA/IDOR) vulnerabilities where an authenticated","domain":"cybersecurity","path":"skills/testing-api-for-broken-object-level-authorization"},{"name":"testing-api-for-mass-assignment-vulnerability","description":"'Tests APIs for mass assignment (auto-binding) vulnerabilities where clients can modify object properties they","domain":"cybersecurity","path":"skills/testing-api-for-mass-assignment-vulnerability"},{"name":"testing-api-security-with-owasp-top-10","description":"Systematically assessing REST and GraphQL API endpoints against the OWASP API Security Top 10 risks using automated","domain":"cybersecurity","path":"skills/testing-api-security-with-owasp-top-10"},{"name":"testing-cors-misconfiguration","description":"Identifying and exploiting Cross-Origin Resource Sharing misconfigurations that allow unauthorized cross-domain","domain":"cybersecurity","path":"skills/testing-cors-misconfiguration"},{"name":"testing-for-broken-access-control","description":"Systematically testing web applications for broken access control vulnerabilities including privilege escalation,","domain":"cybersecurity","path":"skills/testing-for-broken-access-control"},{"name":"testing-for-business-logic-vulnerabilities","description":"Identifying flaws in application business logic that allow price manipulation, workflow bypass, and privilege","domain":"cybersecurity","path":"skills/testing-for-business-logic-vulnerabilities"},{"name":"testing-for-email-header-injection","description":"Test web application email functionality for SMTP header injection vulnerabilities that allow attackers to inject","domain":"cybersecurity","path":"skills/testing-for-email-header-injection"},{"name":"testing-for-host-header-injection","description":"Test web applications for HTTP Host header injection vulnerabilities to identify password reset poisoning, web","domain":"cybersecurity","path":"skills/testing-for-host-header-injection"},{"name":"testing-for-json-web-token-vulnerabilities","description":"Test JWT implementations for critical vulnerabilities including algorithm confusion, none algorithm bypass, kid","domain":"cybersecurity","path":"skills/testing-for-json-web-token-vulnerabilities"},{"name":"testing-for-open-redirect-vulnerabilities","description":"Identify and test open redirect vulnerabilities in web applications by analyzing URL redirection parameters,","domain":"cybersecurity","path":"skills/testing-for-open-redirect-vulnerabilities"},{"name":"testing-for-sensitive-data-exposure","description":"Identifying sensitive data exposure vulnerabilities including API key leakage, PII in responses, insecure storage,","domain":"cybersecurity","path":"skills/testing-for-sensitive-data-exposure"},{"name":"testing-for-xml-injection-vulnerabilities","description":"Test web applications for XML injection vulnerabilities including XXE, XPath injection, and XML entity attacks","domain":"cybersecurity","path":"skills/testing-for-xml-injection-vulnerabilities"},{"name":"testing-for-xss-vulnerabilities","description":"'Tests web applications for Cross-Site Scripting (XSS) vulnerabilities by injecting JavaScript payloads into","domain":"cybersecurity","path":"skills/testing-for-xss-vulnerabilities"},{"name":"testing-for-xss-vulnerabilities-with-burpsuite","description":"Identifying and validating cross-site scripting vulnerabilities using Burp Suite's scanner, intruder, and repeater","domain":"cybersecurity","path":"skills/testing-for-xss-vulnerabilities-with-burpsuite"},{"name":"testing-for-xxe-injection-vulnerabilities","description":"Discovering and exploiting XML External Entity injection vulnerabilities to read server files, perform SSRF,","domain":"cybersecurity","path":"skills/testing-for-xxe-injection-vulnerabilities"},{"name":"testing-jwt-token-security","description":"Assessing JSON Web Token implementations for cryptographic weaknesses, algorithm confusion attacks, and authorization","domain":"cybersecurity","path":"skills/testing-jwt-token-security"},{"name":"testing-mobile-api-authentication","description":"'Tests authentication and authorization mechanisms in mobile application APIs to identify broken authentication,","domain":"cybersecurity","path":"skills/testing-mobile-api-authentication"},{"name":"testing-oauth2-implementation-flaws","description":"'Tests OAuth 2.0 and OpenID Connect implementations for security flaws including authorization code interception,","domain":"cybersecurity","path":"skills/testing-oauth2-implementation-flaws"},{"name":"testing-ransomware-recovery-procedures","description":"Test and validate ransomware recovery procedures including backup restore operations, RTO/RPO target verification,","domain":"cybersecurity","path":"skills/testing-ransomware-recovery-procedures"},{"name":"testing-websocket-api-security","description":"'Tests WebSocket API implementations for security vulnerabilities including missing authentication on WebSocket","domain":"cybersecurity","path":"skills/testing-websocket-api-security"},{"name":"tracking-threat-actor-infrastructure","description":"Threat actor infrastructure tracking involves monitoring and mapping adversary-controlled assets including command-and-control","domain":"cybersecurity","path":"skills/tracking-threat-actor-infrastructure"},{"name":"triaging-security-alerts-in-splunk","description":"'Triages security alerts in Splunk Enterprise Security by classifying severity, investigating notable events,","domain":"cybersecurity","path":"skills/triaging-security-alerts-in-splunk"},{"name":"triaging-security-incident","description":"'Performs initial triage of security incidents to determine severity, scope, and required response actions using","domain":"cybersecurity","path":"skills/triaging-security-incident"},{"name":"triaging-security-incident-with-ir-playbook","description":"Classify and prioritize security incidents using structured IR playbooks to determine severity, assign response","domain":"cybersecurity","path":"skills/triaging-security-incident-with-ir-playbook"},{"name":"triaging-vulnerabilities-with-ssvc-framework","description":"Triage and prioritize vulnerabilities using CISA's Stakeholder-Specific Vulnerability Categorization (SSVC) decision","domain":"cybersecurity","path":"skills/triaging-vulnerabilities-with-ssvc-framework"},{"name":"validating-backup-integrity-for-recovery","description":"Validate backup integrity through cryptographic hash verification, automated restore testing, corruption detection,","domain":"cybersecurity","path":"skills/validating-backup-integrity-for-recovery"}]}
\ No newline at end of file
diff --git a/personas/_shared/anthropic-cybersecurity-skills/mappings/README.md b/personas/_shared/anthropic-cybersecurity-skills/mappings/README.md
new file mode 100644
index 0000000..d579c53
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/mappings/README.md
@@ -0,0 +1,88 @@
+# MITRE ATT&CK Navigator Layer - Anthropic Cybersecurity Skills
+
+This directory contains a MITRE ATT&CK Navigator layer file that maps the coverage of the Anthropic Cybersecurity Skills repository against the ATT&CK Enterprise matrix.
+
+## Files
+
+| File | Description |
+|------|-------------|
+| `attack-navigator-layer.json` | ATT&CK Navigator layer (v4.5 format, Enterprise ATT&CK v14) |
+
+## How to View
+
+1. Open the [MITRE ATT&CK Navigator](https://mitre-attack.github.io/attack-navigator/)
+2. Click **Open Existing Layer**
+3. Select **Upload from local** and choose `attack-navigator-layer.json`
+4. The matrix will display with blue-shaded techniques indicating coverage
+
+Alternatively, paste the raw JSON URL into the Navigator's "Load from URL" option if this file is hosted publicly.
+
+## Coverage Statistics
+
+| Metric | Value |
+|--------|-------|
+| Total skills scanned | 742 |
+| Unique ATT&CK techniques referenced | 218 |
+| Parent techniques | 94 |
+| Sub-techniques | 124 |
+| Tactics with coverage | 14/14 |
+
+## Coverage by Tactic
+
+| Tactic | Techniques Covered |
+|--------|-------------------|
+| Defense Evasion | 36 |
+| Credential Access | 33 |
+| Persistence | 29 |
+| Initial Access | 17 |
+| Command and Control | 17 |
+| Privilege Escalation | 13 |
+| Discovery | 12 |
+| Exfiltration | 12 |
+| Reconnaissance | 11 |
+| Collection | 10 |
+| Lateral Movement | 9 |
+| Execution | 8 |
+| Resource Development | 6 |
+| Impact | 5 |
+
+## Color Scale
+
+The layer uses a blue gradient to indicate coverage depth:
+
+- **Light blue** (`#cfe2f3`): 1-2 skills reference this technique
+- **Medium blue** (`#6fa8dc`): 3-5 skills reference this technique
+- **Dark blue** (`#3d85c6`): 6-10 skills reference this technique
+- **Deep blue** (`#1155cc`): 11+ skills reference this technique
+
+## Top 10 Most Covered Techniques
+
+| Technique | Name | Skills |
+|-----------|------|--------|
+| T1059.001 | PowerShell | 26 |
+| T1055 | Process Injection | 17 |
+| T1053.005 | Scheduled Task | 16 |
+| T1566.001 | Spearphishing Attachment | 15 |
+| T1558.003 | Kerberoasting | 14 |
+| T1547.001 | Registry Run Keys / Startup Folder | 13 |
+| T1078 | Valid Accounts | 13 |
+| T1003.006 | DCSync | 13 |
+| T1071.001 | Web Protocols | 12 |
+| T1021.002 | SMB/Windows Admin Shares | 12 |
+
+## Methodology
+
+Techniques were extracted by scanning all `SKILL.md` files in the repository for ATT&CK technique ID patterns (`T1XXX` and `T1XXX.XXX`). Each technique's score is proportional to the number of distinct skills that reference it, normalized to a 1-100 scale.
+
+## Layer Format
+
+- **Format version**: 4.5
+- **ATT&CK version**: 14 (Enterprise)
+- **Navigator version**: 4.9.1
+- **Domain**: enterprise-attack
+
+## Related Links
+
+- [MITRE ATT&CK Framework](https://attack.mitre.org/)
+- [ATT&CK Navigator](https://mitre-attack.github.io/attack-navigator/)
+- [ATT&CK Navigator GitHub](https://github.com/mitre-attack/attack-navigator)
diff --git a/personas/_shared/anthropic-cybersecurity-skills/mappings/attack-navigator-layer.json b/personas/_shared/anthropic-cybersecurity-skills/mappings/attack-navigator-layer.json
new file mode 100644
index 0000000..0fea4a1
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/mappings/attack-navigator-layer.json
@@ -0,0 +1,3594 @@
+{
+ "name": "Anthropic Cybersecurity Skills - ATT&CK Coverage",
+ "versions": {
+ "attack": "14",
+ "navigator": "4.9.1",
+ "layer": "4.5"
+ },
+ "domain": "enterprise-attack",
+ "description": "MITRE ATT&CK technique coverage map for the Anthropic Cybersecurity Skills repository. Each technique is scored by the number of skills that reference it. Higher scores (darker colors) indicate more comprehensive coverage across multiple training skills.",
+ "filters": {
+ "platforms": [
+ "Linux",
+ "macOS",
+ "Windows",
+ "Network",
+ "PRE",
+ "Containers",
+ "Office 365",
+ "SaaS",
+ "Google Workspace",
+ "IaaS",
+ "Azure AD"
+ ]
+ },
+ "sorting": 3,
+ "layout": {
+ "layout": "side",
+ "showID": true,
+ "showName": true,
+ "showAggregateScores": false,
+ "countUnscored": false,
+ "aggregateFunction": "average",
+ "expandedSubtechniques": "annotated"
+ },
+ "hideDisabled": false,
+ "techniques": [
+ {
+ "techniqueID": "T1003",
+ "score": 42,
+ "comment": "OS Credential Dumping - Referenced in 11 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "11"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, building-detection-rules-with-sigma, detecting-container-escape-with-falco-rules, detecting-credential-dumping-techniques, detecting-credential-dumping-with-edr (+6 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1003.001",
+ "score": 46,
+ "comment": "LSASS Memory - Referenced in 12 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "12"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, building-detection-rule-with-splunk-spl, building-detection-rules-with-sigma, conducting-full-scope-red-team-engagement, conducting-internal-network-penetration-test (+7 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1003.002",
+ "score": 8,
+ "comment": "SAM - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-credential-dumping-with-edr, detecting-t1003-credential-dumping-with-edr"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1003.003",
+ "score": 8,
+ "comment": "NTDS - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-credential-dumping-with-edr, detecting-t1003-credential-dumping-with-edr"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1003.004",
+ "score": 12,
+ "comment": "LSA Secrets - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-credential-dumping-with-edr, detecting-t1003-credential-dumping-with-edr, performing-credential-access-with-lazagne"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1003.005",
+ "score": 8,
+ "comment": "Cached Domain Credentials - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-credential-dumping-with-edr, detecting-t1003-credential-dumping-with-edr"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1003.006",
+ "score": 50,
+ "comment": "DCSync - Referenced in 13 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "13"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, conducting-domain-persistence-with-dcsync, conducting-full-scope-red-team-engagement, conducting-internal-network-penetration-test, detecting-credential-dumping-with-edr (+8 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1005",
+ "score": 8,
+ "comment": "Data from Local System - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-malware-incident-response, detecting-container-escape-with-falco-rules"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1016",
+ "score": 12,
+ "comment": "System Network Configuration Discovery - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, conducting-internal-reconnaissance-with-bloodhound-ce, exploiting-active-directory-with-bloodhound"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1018",
+ "score": 15,
+ "comment": "Remote System Discovery - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, conducting-internal-reconnaissance-with-bloodhound-ce, exploiting-active-directory-with-bloodhound, performing-active-directory-bloodhound-analysis"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1020",
+ "score": 4,
+ "comment": "Automated Exfiltration - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-exfiltration-indicators"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1021",
+ "score": 38,
+ "comment": "Remote Services - Referenced in 10 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "10"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-lateral-movement-in-network, detecting-lateral-movement-with-splunk, detecting-service-account-abuse, exploiting-constrained-delegation-abuse, implementing-continuous-security-validation-with-bas (+5 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1021.001",
+ "score": 31,
+ "comment": "Remote Desktop Protocol - Referenced in 8 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "8"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, building-attack-pattern-library-from-cti-reports, detecting-lateral-movement-with-splunk, executing-red-team-exercise, implementing-mitre-attack-coverage-mapping (+3 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1021.002",
+ "score": 46,
+ "comment": "SMB/Windows Admin Shares - Referenced in 12 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "12"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, building-attack-pattern-library-from-cti-reports, building-detection-rule-with-splunk-spl, conducting-full-scope-red-team-engagement, conducting-internal-network-penetration-test (+7 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1021.003",
+ "score": 12,
+ "comment": "DCOM - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-lateral-movement-with-splunk, performing-lateral-movement-detection, performing-lateral-movement-with-wmiexec"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1021.004",
+ "score": 4,
+ "comment": "SSH - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-lateral-movement-with-splunk"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1021.006",
+ "score": 12,
+ "comment": "Windows Remote Management - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, detecting-lateral-movement-with-splunk, performing-lateral-movement-detection"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1027",
+ "score": 8,
+ "comment": "Obfuscated Files or Information - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, conducting-full-scope-red-team-engagement"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1029",
+ "score": 4,
+ "comment": "Scheduled Transfer - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-exfiltration-indicators"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1030",
+ "score": 4,
+ "comment": "Data Transfer Size Limits - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-exfiltration-indicators"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1033",
+ "score": 8,
+ "comment": "System Owner/User Discovery - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-internal-reconnaissance-with-bloodhound-ce, exploiting-active-directory-with-bloodhound"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1036",
+ "score": 12,
+ "comment": "Masquerading - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-evasion-techniques-in-endpoint-logs, implementing-mitre-attack-coverage-mapping, implementing-siem-use-cases-for-detection"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1036.005",
+ "score": 4,
+ "comment": "Match Legitimate Name or Location - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-injection-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1040",
+ "score": 4,
+ "comment": "Network Sniffing - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "implementing-continuous-security-validation-with-bas"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1041",
+ "score": 35,
+ "comment": "Exfiltration Over C2 Channel - Referenced in 9 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "9"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-ransomware-network-indicators, building-attack-pattern-library-from-cti-reports, conducting-full-scope-red-team-engagement, conducting-malware-incident-response, executing-red-team-exercise (+4 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1047",
+ "score": 19,
+ "comment": "Windows Management Instrumentation - Referenced in 5 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "5"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, detecting-lateral-movement-with-splunk, performing-lateral-movement-detection, performing-lateral-movement-with-wmiexec, performing-purple-team-exercise"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1048",
+ "score": 19,
+ "comment": "Exfiltration Over Alternative Protocol - Referenced in 5 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "5"
+ },
+ {
+ "name": "skills",
+ "value": "building-detection-rule-with-splunk-spl, conducting-full-scope-red-team-engagement, hunting-for-data-exfiltration-indicators, implementing-continuous-security-validation-with-bas, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1048.001",
+ "score": 4,
+ "comment": "Symmetric Encrypted Non-C2 - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-exfiltration-indicators"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1048.002",
+ "score": 4,
+ "comment": "Asymmetric Encrypted Non-C2 - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-exfiltration-indicators"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1048.003",
+ "score": 19,
+ "comment": "Unencrypted/Obfuscated Non-C2 - Referenced in 5 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "5"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, hunting-for-data-exfiltration-indicators, hunting-for-dns-tunneling-with-zeek, implementing-continuous-security-validation-with-bas, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1052",
+ "score": 4,
+ "comment": "Exfiltration Over Physical Medium - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-exfiltration-indicators"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1053",
+ "score": 23,
+ "comment": "Scheduled Task/Job - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-persistence-mechanisms-in-linux, hunting-for-persistence-mechanisms-in-windows, implementing-mitre-attack-coverage-mapping, implementing-siem-use-cases-for-detection (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1053.002",
+ "score": 4,
+ "comment": "At - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-scheduled-task-persistence"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1053.003",
+ "score": 8,
+ "comment": "Cron - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-scheduled-task-persistence, performing-privilege-escalation-on-linux"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1053.005",
+ "score": 62,
+ "comment": "Scheduled Task - Referenced in 16 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "16"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-windows-event-logs-in-splunk, building-attack-pattern-library-from-cti-reports, building-detection-rule-with-splunk-spl, conducting-full-scope-red-team-engagement (+11 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055",
+ "score": 65,
+ "comment": "Process Injection - Referenced in 17 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "17"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, building-red-team-c2-infrastructure-with-havoc, conducting-full-scope-red-team-engagement, detecting-evasion-techniques-in-endpoint-logs, detecting-process-hollowing-technique (+12 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.001",
+ "score": 15,
+ "comment": "DLL Injection - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-hollowing-technique, detecting-process-injection-techniques, detecting-t1055-process-injection-with-sysmon, hunting-for-process-injection-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.002",
+ "score": 8,
+ "comment": "Portable Executable Injection - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-injection-techniques, detecting-t1055-process-injection-with-sysmon"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.003",
+ "score": 12,
+ "comment": "Thread Execution Hijacking - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-hollowing-technique, detecting-process-injection-techniques, detecting-t1055-process-injection-with-sysmon"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.004",
+ "score": 12,
+ "comment": "APC Injection - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-hollowing-technique, detecting-process-injection-techniques, detecting-t1055-process-injection-with-sysmon"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.005",
+ "score": 8,
+ "comment": "Thread Local Storage - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-injection-techniques, detecting-t1055-process-injection-with-sysmon"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.008",
+ "score": 4,
+ "comment": "Ptrace System Calls - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-injection-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.009",
+ "score": 4,
+ "comment": "Proc Memory - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-injection-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.011",
+ "score": 4,
+ "comment": "Extra Window Memory Injection - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-injection-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.012",
+ "score": 23,
+ "comment": "Process Hollowing - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-malware-incident-response, detecting-fileless-malware-techniques, detecting-process-hollowing-technique, detecting-process-injection-techniques, detecting-t1055-process-injection-with-sysmon (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.013",
+ "score": 12,
+ "comment": "Process Doppelganging - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-hollowing-technique, detecting-process-injection-techniques, detecting-t1055-process-injection-with-sysmon"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.014",
+ "score": 4,
+ "comment": "VDSO Hijacking - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-injection-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1055.015",
+ "score": 8,
+ "comment": "ListPlanting - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-process-injection-techniques, detecting-t1055-process-injection-with-sysmon"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1059",
+ "score": 38,
+ "comment": "Command and Scripting Interpreter - Referenced in 10 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "10"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-threat-actor-ttps-with-mitre-attack, analyzing-windows-event-logs-in-splunk, building-incident-timeline-with-timesketch, deobfuscating-powershell-obfuscated-malware (+5 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1059.001",
+ "score": 100,
+ "comment": "PowerShell - Referenced in 26 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "26"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-macro-malware-in-office-documents, analyzing-powershell-empire-artifacts, analyzing-security-logs-with-splunk, analyzing-threat-actor-ttps-with-mitre-navigator (+21 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1059.003",
+ "score": 12,
+ "comment": "Windows Command Shell - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, detecting-suspicious-powershell-execution, mapping-mitre-attack-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1059.005",
+ "score": 15,
+ "comment": "Visual Basic - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-macro-malware-in-office-documents, executing-red-team-exercise, hunting-for-lolbins-execution-in-endpoint-logs, mapping-mitre-attack-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1068",
+ "score": 31,
+ "comment": "Exploitation for Privilege Escalation - Referenced in 8 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "8"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, detecting-container-escape-attempts, detecting-privilege-escalation-attempts, detecting-privilege-escalation-in-kubernetes-pods, exploiting-nopac-cve-2021-42278-42287 (+3 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1069.001",
+ "score": 4,
+ "comment": "Local Groups - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-active-directory-bloodhound-analysis"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1069.002",
+ "score": 15,
+ "comment": "Domain Groups - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-internal-reconnaissance-with-bloodhound-ce, exploiting-active-directory-with-bloodhound, performing-active-directory-bloodhound-analysis, performing-kerberoasting-attack"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1070",
+ "score": 12,
+ "comment": "Indicator Removal - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-evasion-techniques-in-endpoint-logs, implementing-siem-use-cases-for-detection, implementing-velociraptor-for-ir-collection"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1070.001",
+ "score": 12,
+ "comment": "Clear Windows Event Logs - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-evasion-techniques-in-endpoint-logs, implementing-mitre-attack-coverage-mapping, performing-purple-team-exercise"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1070.004",
+ "score": 4,
+ "comment": "File Deletion - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "implementing-threat-modeling-with-mitre-attack"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1070.006",
+ "score": 8,
+ "comment": "Timestomping - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-evasion-techniques-in-endpoint-logs, hunting-for-defense-evasion-via-timestomping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1071",
+ "score": 38,
+ "comment": "Application Layer Protocol - Referenced in 10 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "10"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-network-covert-channels-in-malware, analyzing-ransomware-network-indicators, analyzing-threat-actor-ttps-with-mitre-attack, hunting-advanced-persistent-threats (+5 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1071.001",
+ "score": 46,
+ "comment": "Web Protocols - Referenced in 12 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "12"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, building-c2-infrastructure-with-sliver-framework, building-red-team-c2-infrastructure-with-havoc, conducting-malware-incident-response, detecting-process-injection-techniques (+7 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1071.004",
+ "score": 27,
+ "comment": "DNS - Referenced in 7 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "7"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, building-c2-infrastructure-with-sliver-framework, hunting-for-beaconing-with-frequency-analysis, hunting-for-command-and-control-beaconing, hunting-for-dns-tunneling-with-zeek (+2 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1074",
+ "score": 12,
+ "comment": "Data Staged - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, executing-red-team-exercise, hunting-for-data-staging-before-exfiltration"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1074.001",
+ "score": 4,
+ "comment": "Local Data Staging - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-staging-before-exfiltration"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1074.002",
+ "score": 4,
+ "comment": "Remote Data Staging - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-staging-before-exfiltration"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1078",
+ "score": 50,
+ "comment": "Valid Accounts - Referenced in 13 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "13"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-windows-event-logs-in-splunk, conducting-full-scope-red-team-engagement, conducting-internal-network-penetration-test, detecting-insider-threat-behaviors (+8 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1078.001",
+ "score": 4,
+ "comment": "Default Accounts - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-service-account-abuse"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1078.002",
+ "score": 23,
+ "comment": "Domain Accounts - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-domain-persistence-with-dcsync, detecting-service-account-abuse, exploiting-active-directory-certificate-services-esc1, exploiting-constrained-delegation-abuse, exploiting-nopac-cve-2021-42278-42287 (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1078.004",
+ "score": 12,
+ "comment": "Cloud Accounts - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-azure-service-principal-abuse, implementing-mitre-attack-coverage-mapping, implementing-threat-modeling-with-mitre-attack"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1082",
+ "score": 4,
+ "comment": "System Information Discovery - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1087",
+ "score": 8,
+ "comment": "Account Discovery - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, implementing-continuous-security-validation-with-bas"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1087.002",
+ "score": 23,
+ "comment": "Domain Account - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-internal-reconnaissance-with-bloodhound-ce, exploiting-active-directory-certificate-services-esc1, exploiting-active-directory-with-bloodhound, exploiting-kerberoasting-with-impacket, performing-active-directory-bloodhound-analysis (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1087.004",
+ "score": 8,
+ "comment": "Cloud Account - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-azure-service-principal-abuse, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1090",
+ "score": 4,
+ "comment": "Proxy - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1090.002",
+ "score": 8,
+ "comment": "External Proxy - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "building-c2-infrastructure-with-sliver-framework, building-red-team-c2-infrastructure-with-havoc"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1090.004",
+ "score": 4,
+ "comment": "Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-domain-fronting-c2-traffic"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1091",
+ "score": 4,
+ "comment": "Replication Through Removable Media - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-physical-intrusion-assessment"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1095",
+ "score": 8,
+ "comment": "Non-Application Layer Protocol - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-command-and-control-beaconing, hunting-for-unusual-network-connections"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1098",
+ "score": 19,
+ "comment": "Account Manipulation - Referenced in 5 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "5"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, conducting-domain-persistence-with-dcsync, hunting-for-t1098-account-manipulation, implementing-mitre-attack-coverage-mapping, performing-active-directory-compromise-investigation"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1098.001",
+ "score": 12,
+ "comment": "Additional Cloud Credentials - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-cloud-penetration-testing, detecting-azure-service-principal-abuse, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1098.002",
+ "score": 4,
+ "comment": "Additional Email Delegate Permissions - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-email-forwarding-rules-attack"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1102",
+ "score": 4,
+ "comment": "Web Service - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-living-off-the-cloud-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1105",
+ "score": 23,
+ "comment": "Ingress Tool Transfer - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "building-c2-infrastructure-with-sliver-framework, building-red-team-c2-infrastructure-with-havoc, detecting-living-off-the-land-with-lolbas, implementing-mitre-attack-coverage-mapping, implementing-siem-use-cases-for-detection (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1110",
+ "score": 15,
+ "comment": "Brute Force - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, conducting-internal-network-penetration-test, implementing-mitre-attack-coverage-mapping, performing-alert-triage-with-elastic-siem"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1110.001",
+ "score": 15,
+ "comment": "Password Guessing - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, building-detection-rule-with-splunk-spl, implementing-siem-use-cases-for-detection, performing-false-positive-reduction-in-siem"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1110.002",
+ "score": 4,
+ "comment": "Password Cracking - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "exploiting-kerberoasting-with-impacket"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1110.003",
+ "score": 4,
+ "comment": "Password Spraying - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "implementing-siem-use-cases-for-detection"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1112",
+ "score": 4,
+ "comment": "Modify Registry - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-fileless-malware-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1114.002",
+ "score": 4,
+ "comment": "Remote Email Collection - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-email-forwarding-rules-attack"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1114.003",
+ "score": 8,
+ "comment": "Email Forwarding Rule - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-business-email-compromise, detecting-email-forwarding-rules-attack"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1127",
+ "score": 8,
+ "comment": "Trusted Developer Utilities Proxy Execution - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-evasion-techniques-in-endpoint-logs, detecting-living-off-the-land-with-lolbas"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1127.001",
+ "score": 4,
+ "comment": "MSBuild - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-lolbins-execution-in-endpoint-logs"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1132",
+ "score": 4,
+ "comment": "Data Encoding - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-command-and-control-beaconing"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1132.001",
+ "score": 4,
+ "comment": "Standard Encoding - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "building-c2-infrastructure-with-sliver-framework"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1133",
+ "score": 4,
+ "comment": "External Remote Services - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-threat-landscape-assessment-for-sector"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1134",
+ "score": 8,
+ "comment": "Access Token Manipulation - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, detecting-privilege-escalation-attempts"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1134.001",
+ "score": 4,
+ "comment": "Token Impersonation/Theft - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "exploiting-constrained-delegation-abuse"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1134.005",
+ "score": 4,
+ "comment": "SID-History Injection - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-active-directory-compromise-investigation"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1136",
+ "score": 8,
+ "comment": "Create Account - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-privilege-escalation-in-kubernetes-pods, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1136.001",
+ "score": 4,
+ "comment": "Local Account - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1136.002",
+ "score": 4,
+ "comment": "Domain Account - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "exploiting-nopac-cve-2021-42278-42287"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1140",
+ "score": 12,
+ "comment": "Deobfuscate/Decode Files or Information - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-living-off-the-land-with-lolbas, hunting-for-living-off-the-land-binaries, hunting-for-lolbins-execution-in-endpoint-logs"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1190",
+ "score": 15,
+ "comment": "Exploit Public-Facing Application - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, exploiting-ms17-010-eternalblue-vulnerability, hunting-for-webshell-activity, performing-threat-landscape-assessment-for-sector"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1195",
+ "score": 8,
+ "comment": "Supply Chain Compromise - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-supply-chain-malware-artifacts, performing-threat-landscape-assessment-for-sector"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1195.001",
+ "score": 4,
+ "comment": "Compromise Software Dependencies - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-supply-chain-compromise"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1195.002",
+ "score": 4,
+ "comment": "Compromise Software Supply Chain - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-supply-chain-compromise"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1197",
+ "score": 8,
+ "comment": "BITS Jobs - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-living-off-the-land-binaries, hunting-for-lolbins-execution-in-endpoint-logs"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1199",
+ "score": 8,
+ "comment": "Trusted Relationship - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-supply-chain-compromise, performing-physical-intrusion-assessment"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1200",
+ "score": 4,
+ "comment": "Hardware Additions - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-physical-intrusion-assessment"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1204.001",
+ "score": 4,
+ "comment": "Malicious Link - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-spearphishing-simulation-campaign"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1204.002",
+ "score": 23,
+ "comment": "Malicious File - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-macro-malware-in-office-documents, conducting-full-scope-red-team-engagement, conducting-spearphishing-simulation-campaign, implementing-siem-use-cases-for-detection, performing-dynamic-analysis-with-any-run (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1210",
+ "score": 8,
+ "comment": "Exploitation of Remote Services - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "exploiting-ms17-010-eternalblue-vulnerability, exploiting-zerologon-vulnerability-cve-2020-1472"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1213",
+ "score": 4,
+ "comment": "Data from Information Repositories - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1218",
+ "score": 23,
+ "comment": "System Binary Proxy Execution - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-evasion-techniques-in-endpoint-logs, detecting-living-off-the-land-with-lolbas, hunting-advanced-persistent-threats, hunting-for-living-off-the-land-binaries, hunting-for-lolbins-execution-in-endpoint-logs (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1218.001",
+ "score": 8,
+ "comment": "Compiled HTML File - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-living-off-the-land-binaries, hunting-for-lolbins-execution-in-endpoint-logs"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1218.002",
+ "score": 4,
+ "comment": "Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-living-off-the-land-binaries"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1218.003",
+ "score": 8,
+ "comment": "CMSTP - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-living-off-the-land-binaries, hunting-for-lolbins-execution-in-endpoint-logs"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1218.005",
+ "score": 12,
+ "comment": "Mshta - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-fileless-malware-techniques, hunting-for-living-off-the-land-binaries, hunting-for-lolbins-execution-in-endpoint-logs"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1218.010",
+ "score": 8,
+ "comment": "Regsvr32 - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-living-off-the-land-binaries, hunting-for-lolbins-execution-in-endpoint-logs"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1218.011",
+ "score": 12,
+ "comment": "Rundll32 - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-living-off-the-land-binaries, hunting-for-lolbins-execution-in-endpoint-logs, performing-dynamic-analysis-with-any-run"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1222.001",
+ "score": 4,
+ "comment": "Windows - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-domain-persistence-with-dcsync"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1482",
+ "score": 12,
+ "comment": "Domain Trust Discovery - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-internal-reconnaissance-with-bloodhound-ce, exploiting-active-directory-with-bloodhound, performing-active-directory-bloodhound-analysis"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1484",
+ "score": 8,
+ "comment": "Domain Policy Modification - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "exploiting-active-directory-certificate-services-esc1, performing-active-directory-vulnerability-assessment"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1484.001",
+ "score": 4,
+ "comment": "Group Policy Modification - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-active-directory-compromise-investigation"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1485",
+ "score": 4,
+ "comment": "Data Destruction - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-shadow-copy-deletion"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1486",
+ "score": 23,
+ "comment": "Data Encrypted for Impact - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, hunting-for-shadow-copy-deletion, implementing-honeypot-for-ransomware-detection, implementing-mitre-attack-coverage-mapping, performing-purple-team-exercise (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1489",
+ "score": 4,
+ "comment": "Service Stop - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1490",
+ "score": 12,
+ "comment": "Inhibit System Recovery - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "building-soc-playbook-for-ransomware, hunting-for-shadow-copy-deletion, performing-purple-team-exercise"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1497",
+ "score": 4,
+ "comment": "Virtualization/Sandbox Evasion - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-malware-sandbox-evasion-techniques"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1505.003",
+ "score": 8,
+ "comment": "Web Shell - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, hunting-for-webshell-activity"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1528",
+ "score": 4,
+ "comment": "Steal Application Access Token - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-azure-service-principal-abuse"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1530",
+ "score": 12,
+ "comment": "Data from Cloud Storage Object - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-insider-threat-behaviors, implementing-mitre-attack-coverage-mapping, performing-cloud-incident-containment-procedures"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1534",
+ "score": 4,
+ "comment": "Internal Spearphishing - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1537",
+ "score": 19,
+ "comment": "Transfer Data to Cloud Account - Referenced in 5 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "5"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-exfiltration-indicators, hunting-for-living-off-the-cloud-techniques, implementing-mitre-attack-coverage-mapping, implementing-threat-modeling-with-mitre-attack, performing-cloud-incident-containment-procedures"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1539",
+ "score": 8,
+ "comment": "Steal Web Session Cookie - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "performing-credential-access-with-lazagne, performing-initial-access-with-evilginx3"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1543",
+ "score": 8,
+ "comment": "Create or Modify System Process - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-persistence-mechanisms-in-linux, hunting-for-persistence-mechanisms-in-windows"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1543.002",
+ "score": 4,
+ "comment": "Systemd Service - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-privilege-escalation-on-linux"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1543.003",
+ "score": 12,
+ "comment": "Windows Service - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-persistence-mechanisms-in-windows, hunting-for-unusual-service-installations, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1546",
+ "score": 4,
+ "comment": "Event Triggered Execution - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-persistence-mechanisms-in-linux"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1546.003",
+ "score": 19,
+ "comment": "WMI Event Subscription - Referenced in 5 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "5"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, detecting-fileless-malware-techniques, detecting-wmi-persistence, hunting-for-persistence-mechanisms-in-windows, hunting-for-persistence-via-wmi-subscriptions"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1546.010",
+ "score": 4,
+ "comment": "AppInit DLLs - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-persistence-mechanisms-in-windows"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1546.012",
+ "score": 8,
+ "comment": "IFEO Injection - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-persistence-mechanisms-in-windows, hunting-for-registry-persistence-mechanisms"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1546.015",
+ "score": 8,
+ "comment": "COM Hijacking - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-persistence-mechanisms-in-windows, hunting-for-registry-persistence-mechanisms"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1547",
+ "score": 23,
+ "comment": "Boot or Logon Autostart Execution - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-malware-persistence-with-autoruns, hunting-advanced-persistent-threats, hunting-for-persistence-mechanisms-in-windows, implementing-siem-use-cases-for-detection (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1547.001",
+ "score": 50,
+ "comment": "Registry Run Keys / Startup Folder - Referenced in 13 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "13"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-windows-event-logs-in-splunk, building-attack-pattern-library-from-cti-reports, conducting-full-scope-red-team-engagement, hunting-for-persistence-mechanisms-in-windows (+8 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1547.004",
+ "score": 8,
+ "comment": "Winlogon Helper DLL - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-persistence-mechanisms-in-windows, hunting-for-registry-persistence-mechanisms"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1547.005",
+ "score": 4,
+ "comment": "Security Support Provider - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-persistence-mechanisms-in-windows"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1548",
+ "score": 15,
+ "comment": "Abuse Elevation Control Mechanism - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-container-escape-attempts, detecting-privilege-escalation-in-kubernetes-pods, detecting-t1548-abuse-elevation-control-mechanism, performing-privilege-escalation-assessment"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1548.001",
+ "score": 12,
+ "comment": "Setuid and Setgid - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-privilege-escalation-in-kubernetes-pods, detecting-t1548-abuse-elevation-control-mechanism, performing-privilege-escalation-on-linux"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1548.002",
+ "score": 12,
+ "comment": "Bypass User Account Control - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, detecting-privilege-escalation-attempts, detecting-t1548-abuse-elevation-control-mechanism"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1548.003",
+ "score": 12,
+ "comment": "Sudo and Sudo Caching - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-t1548-abuse-elevation-control-mechanism, performing-privilege-escalation-assessment, performing-privilege-escalation-on-linux"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1548.004",
+ "score": 4,
+ "comment": "Elevated Execution with Prompt - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-t1548-abuse-elevation-control-mechanism"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1550",
+ "score": 4,
+ "comment": "Use Alternate Authentication Material - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-lateral-movement-detection"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1550.002",
+ "score": 35,
+ "comment": "Pass the Hash - Referenced in 9 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "9"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, building-attack-pattern-library-from-cti-reports, conducting-full-scope-red-team-engagement, detecting-lateral-movement-in-network, detecting-pass-the-hash-attacks (+4 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1550.003",
+ "score": 15,
+ "comment": "Pass the Ticket - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-pass-the-ticket-attack, detecting-pass-the-hash-attacks, detecting-pass-the-ticket-attacks, exploiting-constrained-delegation-abuse"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1550.004",
+ "score": 4,
+ "comment": "Web Session Cookie - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-initial-access-with-evilginx3"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1552",
+ "score": 4,
+ "comment": "Unsecured Credentials - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-cloud-incident-containment-procedures"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1552.001",
+ "score": 4,
+ "comment": "Credentials In Files - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-credential-access-with-lazagne"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1552.002",
+ "score": 4,
+ "comment": "Credentials in Registry - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-credential-access-with-lazagne"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1552.005",
+ "score": 4,
+ "comment": "Cloud Instance Metadata API - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-cloud-penetration-testing"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1555",
+ "score": 4,
+ "comment": "Credentials from Password Stores - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-credential-access-with-lazagne"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1555.003",
+ "score": 4,
+ "comment": "Web Browsers - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-credential-access-with-lazagne"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1555.004",
+ "score": 4,
+ "comment": "Windows Credential Manager - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-credential-access-with-lazagne"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1556",
+ "score": 4,
+ "comment": "Modify Authentication Process - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-initial-access-with-evilginx3"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1557",
+ "score": 4,
+ "comment": "Adversary-in-the-Middle - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-initial-access-with-evilginx3"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1557.001",
+ "score": 8,
+ "comment": "LLMNR/NBT-NS Poisoning - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-internal-network-penetration-test, hunting-for-ntlm-relay-attacks"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1558",
+ "score": 19,
+ "comment": "Steal or Forge Kerberos Tickets - Referenced in 5 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "5"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, conducting-pass-the-ticket-attack, exploiting-kerberoasting-with-impacket, exploiting-nopac-cve-2021-42278-42287, performing-lateral-movement-detection"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1558.001",
+ "score": 27,
+ "comment": "Golden Ticket - Referenced in 7 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "7"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, conducting-domain-persistence-with-dcsync, detecting-golden-ticket-forgery, detecting-kerberoasting-attacks, detecting-mimikatz-execution-patterns (+2 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1558.002",
+ "score": 4,
+ "comment": "Silver Ticket - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-active-directory-compromise-investigation"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1558.003",
+ "score": 54,
+ "comment": "Kerberoasting - Referenced in 14 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "14"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, building-attack-pattern-library-from-cti-reports, conducting-full-scope-red-team-engagement, conducting-internal-network-penetration-test, detecting-kerberoasting-attacks (+9 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1558.004",
+ "score": 4,
+ "comment": "AS-REP Roasting - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-kerberoasting-attacks"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1560",
+ "score": 8,
+ "comment": "Archive Collected Data - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, hunting-for-data-staging-before-exfiltration"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1562",
+ "score": 4,
+ "comment": "Impair Defenses - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-evasion-techniques-in-endpoint-logs"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1562.001",
+ "score": 4,
+ "comment": "Disable or Modify Tools - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-suspicious-powershell-execution"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1566",
+ "score": 23,
+ "comment": "Phishing - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-threat-actor-ttps-with-mitre-attack, analyzing-threat-landscape-with-misp, building-attack-pattern-library-from-cti-reports, implementing-mitre-attack-coverage-mapping (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1566.001",
+ "score": 58,
+ "comment": "Spearphishing Attachment - Referenced in 15 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "15"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-apt-group-with-mitre-navigator, analyzing-macro-malware-in-office-documents, analyzing-threat-actor-ttps-with-mitre-navigator, building-attack-pattern-library-from-cti-reports, conducting-full-scope-red-team-engagement (+10 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1566.002",
+ "score": 23,
+ "comment": "Spearphishing Link - Referenced in 6 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "6"
+ },
+ {
+ "name": "skills",
+ "value": "building-attack-pattern-library-from-cti-reports, conducting-spearphishing-simulation-campaign, hunting-for-spearphishing-indicators, implementing-continuous-security-validation-with-bas, implementing-mitre-attack-coverage-mapping (+1 more)"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1566.003",
+ "score": 12,
+ "comment": "Spearphishing via Service - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-spearphishing-simulation-campaign, hunting-for-spearphishing-indicators, implementing-continuous-security-validation-with-bas"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1566.004",
+ "score": 4,
+ "comment": "Spearphishing Voice - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-social-engineering-pretext-call"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1567",
+ "score": 15,
+ "comment": "Exfiltration Over Web Service - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-insider-threat-behaviors, hunting-for-data-exfiltration-indicators, hunting-for-living-off-the-cloud-techniques, implementing-continuous-security-validation-with-bas"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1567.002",
+ "score": 4,
+ "comment": "Exfiltration to Cloud Storage - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-data-exfiltration-indicators"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1568",
+ "score": 8,
+ "comment": "Dynamic Resolution - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-command-and-control-beaconing, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1568.002",
+ "score": 4,
+ "comment": "Domain Generation Algorithms - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-beaconing-with-frequency-analysis"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1569.002",
+ "score": 12,
+ "comment": "Service Execution - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-lateral-movement-in-network, detecting-lateral-movement-with-splunk, exploiting-ms17-010-eternalblue-vulnerability"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1570",
+ "score": 12,
+ "comment": "Lateral Tool Transfer - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-lateral-movement-in-network, detecting-lateral-movement-with-splunk, performing-lateral-movement-with-wmiexec"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1571",
+ "score": 8,
+ "comment": "Non-Standard Port - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "hunting-for-unusual-network-connections, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1572",
+ "score": 15,
+ "comment": "Protocol Tunneling - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "building-c2-infrastructure-with-sliver-framework, hunting-for-command-and-control-beaconing, hunting-for-dns-tunneling-with-zeek, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1573",
+ "score": 15,
+ "comment": "Encrypted Channel - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-ransomware-network-indicators, hunting-for-beaconing-with-frequency-analysis, hunting-for-command-and-control-beaconing, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1573.002",
+ "score": 8,
+ "comment": "Asymmetric Cryptography - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "building-c2-infrastructure-with-sliver-framework, building-red-team-c2-infrastructure-with-havoc"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1574",
+ "score": 4,
+ "comment": "Hijack Execution Flow - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-persistence-mechanisms-in-linux"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1574.001",
+ "score": 8,
+ "comment": "DLL Search Order Hijacking - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-dll-sideloading-attacks, hunting-for-persistence-mechanisms-in-windows"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1574.002",
+ "score": 15,
+ "comment": "DLL Side-Loading - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "analyzing-windows-event-logs-in-splunk, building-attack-pattern-library-from-cti-reports, detecting-dll-sideloading-attacks, implementing-siem-use-cases-for-detection"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1574.006",
+ "score": 8,
+ "comment": "Dynamic Linker Hijacking - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-dll-sideloading-attacks, performing-privilege-escalation-on-linux"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1574.008",
+ "score": 4,
+ "comment": "Path Interception by Search Order Hijacking - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-dll-sideloading-attacks"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1574.009",
+ "score": 4,
+ "comment": "Unquoted Service Path - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-privilege-escalation-attempts"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1578",
+ "score": 4,
+ "comment": "Modify Cloud Compute Infrastructure - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-cloud-incident-containment-procedures"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1580",
+ "score": 4,
+ "comment": "Cloud Infrastructure Discovery - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1583.001",
+ "score": 15,
+ "comment": "Domains - Referenced in 4 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "4"
+ },
+ {
+ "name": "skills",
+ "value": "building-red-team-c2-infrastructure-with-havoc, conducting-full-scope-red-team-engagement, conducting-spearphishing-simulation-campaign, implementing-mitre-attack-coverage-mapping"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1583.003",
+ "score": 4,
+ "comment": "Virtual Private Server - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "building-red-team-c2-infrastructure-with-havoc"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1585.002",
+ "score": 4,
+ "comment": "Email Accounts - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-spearphishing-simulation-campaign"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1587.001",
+ "score": 8,
+ "comment": "Malware - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "building-red-team-c2-infrastructure-with-havoc, conducting-full-scope-red-team-engagement"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1589",
+ "score": 12,
+ "comment": "Gather Victim Identity Information - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, conducting-social-engineering-pretext-call, performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1590",
+ "score": 4,
+ "comment": "Gather Victim Network Information - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1591",
+ "score": 12,
+ "comment": "Gather Victim Org Information - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "collecting-open-source-intelligence, conducting-social-engineering-pretext-call, performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1592",
+ "score": 4,
+ "comment": "Gather Victim Host Information - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1593",
+ "score": 8,
+ "comment": "Search Open Websites/Domains - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-full-scope-red-team-engagement, performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1594",
+ "score": 4,
+ "comment": "Search Victim-Owned Websites - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1595.001",
+ "score": 4,
+ "comment": "Scanning IP Blocks - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1595.002",
+ "score": 4,
+ "comment": "Vulnerability Scanning - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1596",
+ "score": 4,
+ "comment": "Search Open Technical Databases - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "performing-open-source-intelligence-gathering"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1598",
+ "score": 4,
+ "comment": "Phishing for Information - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-social-engineering-pretext-call"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1598.003",
+ "score": 8,
+ "comment": "Spearphishing Link/Voice - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-social-engineering-pretext-call, conducting-spearphishing-simulation-campaign"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1608.001",
+ "score": 4,
+ "comment": "Upload Malware - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-spearphishing-simulation-campaign"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1608.005",
+ "score": 4,
+ "comment": "Link Target - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-spearphishing-simulation-campaign"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1610",
+ "score": 8,
+ "comment": "Deploy Container - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-container-escape-attempts, detecting-container-escape-with-falco-rules"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1611",
+ "score": 8,
+ "comment": "Escape to Host - Referenced in 2 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "2"
+ },
+ {
+ "name": "skills",
+ "value": "detecting-container-escape-attempts, detecting-container-escape-with-falco-rules"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1615",
+ "score": 12,
+ "comment": "Group Policy Discovery - Referenced in 3 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "3"
+ },
+ {
+ "name": "skills",
+ "value": "conducting-internal-reconnaissance-with-bloodhound-ce, exploiting-active-directory-with-bloodhound, performing-active-directory-bloodhound-analysis"
+ }
+ ]
+ },
+ {
+ "techniqueID": "T1649",
+ "score": 4,
+ "comment": "Steal or Forge Authentication Certificates - Referenced in 1 skill(s)",
+ "enabled": true,
+ "metadata": [
+ {
+ "name": "skill_count",
+ "value": "1"
+ },
+ {
+ "name": "skills",
+ "value": "exploiting-active-directory-certificate-services-esc1"
+ }
+ ]
+ }
+ ],
+ "gradient": {
+ "colors": [
+ "#cfe2f3",
+ "#6fa8dc",
+ "#1155cc"
+ ],
+ "minValue": 1,
+ "maxValue": 100
+ },
+ "legendItems": [
+ {
+ "label": "1-2 skills (Low coverage)",
+ "color": "#cfe2f3"
+ },
+ {
+ "label": "3-5 skills (Moderate coverage)",
+ "color": "#6fa8dc"
+ },
+ {
+ "label": "6-10 skills (Good coverage)",
+ "color": "#3d85c6"
+ },
+ {
+ "label": "11+ skills (Strong coverage)",
+ "color": "#1155cc"
+ }
+ ],
+ "showTacticRowBackground": true,
+ "tacticRowBackground": "#205080",
+ "selectTechniquesAcrossTactics": true,
+ "selectSubtechniquesWithParent": true,
+ "selectVisibleTechniques": false,
+ "metadata": [
+ {
+ "name": "repository",
+ "value": "Anthropic-Cybersecurity-Skills"
+ },
+ {
+ "name": "total_techniques",
+ "value": "218"
+ },
+ {
+ "name": "total_skills_scanned",
+ "value": "742"
+ },
+ {
+ "name": "generated_date",
+ "value": "2026-03-11"
+ },
+ {
+ "name": "attack_version",
+ "value": "14"
+ },
+ {
+ "name": "description",
+ "value": "Auto-generated from skill SKILL.md files referencing ATT&CK technique IDs"
+ }
+ ],
+ "links": [
+ {
+ "label": "Repository",
+ "url": "https://github.com/anthropics/cybersecurity-skills"
+ },
+ {
+ "label": "ATT&CK Navigator",
+ "url": "https://mitre-attack.github.io/attack-navigator/"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/personas/_shared/anthropic-cybersecurity-skills/mappings/mitre-attack/README.md b/personas/_shared/anthropic-cybersecurity-skills/mappings/mitre-attack/README.md
new file mode 100644
index 0000000..d0e21e5
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/mappings/mitre-attack/README.md
@@ -0,0 +1,102 @@
+# MITRE ATT&CK Mapping
+
+This directory maps the cybersecurity skills in this repository to the [MITRE ATT&CK](https://attack.mitre.org/) framework (Enterprise v15).
+
+## Overview
+
+MITRE ATT&CK is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's lifecycle and the platforms they target. This mapping connects our hands-on skills to ATT&CK tactics and techniques, enabling:
+
+- **Threat-informed defense** -- prioritize skill development based on real adversary behavior
+- **Gap analysis** -- identify ATT&CK techniques not yet covered by available skills
+- **Purple team exercises** -- pair offensive (red team) and defensive (blue team) skills for each technique
+- **Agent-driven discovery** -- AI agents can query skills by ATT&CK ID for automated security workflows
+
+## Mapping Methodology
+
+### Tactic Mapping (TA00xx)
+
+Each of the 14 ATT&CK Enterprise tactics represents a distinct adversary objective. Skills are mapped to tactics based on which adversary goal they help achieve (offensive) or defend against (defensive):
+
+| Tactic | ID | Offensive Skills | Defensive Skills |
+|--------|-----|-----------------|------------------|
+| Reconnaissance | TA0043 | penetration-testing, red-teaming | threat-intelligence, phishing-defense |
+| Resource Development | TA0042 | red-teaming | threat-intelligence |
+| Initial Access | TA0001 | web-application-security, penetration-testing | phishing-defense, endpoint-security |
+| Execution | TA0002 | penetration-testing, red-teaming | malware-analysis, endpoint-security, soc-operations |
+| Persistence | TA0003 | red-teaming, penetration-testing | threat-hunting, digital-forensics, endpoint-security |
+| Privilege Escalation | TA0004 | penetration-testing, red-teaming | endpoint-security, identity-access-management |
+| Defense Evasion | TA0005 | red-teaming | malware-analysis, endpoint-security, threat-hunting |
+| Credential Access | TA0006 | penetration-testing, red-teaming | identity-access-management, soc-operations |
+| Discovery | TA0007 | penetration-testing, red-teaming | threat-hunting, network-security |
+| Lateral Movement | TA0008 | red-teaming, penetration-testing | network-security, threat-hunting, soc-operations |
+| Collection | TA0009 | red-teaming | digital-forensics, threat-hunting |
+| Command and Control | TA0011 | red-teaming | threat-intelligence, network-security, soc-operations |
+| Exfiltration | TA0010 | red-teaming | threat-hunting, digital-forensics, network-security |
+| Impact | TA0040 | red-teaming | ransomware-defense, incident-response |
+
+### Technique Mapping (T1xxx)
+
+Skills are mapped to specific techniques based on their content. Examples:
+
+| Technique | ID | Example Skills |
+|-----------|-----|---------------|
+| Phishing | T1566 | analyzing-phishing-email-headers, analyzing-certificate-transparency-for-phishing |
+| Exploit Public-Facing Application | T1190 | web-application-security skills (SQL injection, XSS, SSRF) |
+| OS Credential Dumping | T1003 | penetration-testing credential harvesting skills |
+| PowerShell | T1059.001 | analyzing-windows-event-logs-in-splunk, malware-analysis skills |
+| Remote Services | T1021 | network-security lateral movement skills |
+| Data Encrypted for Impact | T1486 | analyzing-ransomware-encryption-mechanisms |
+| Command and Scripting Interpreter | T1059 | malware-analysis script deobfuscation skills |
+| Scheduled Task/Job | T1053 | analyzing-malware-persistence-with-autoruns |
+| Registry Run Keys | T1547.001 | analyzing-windows-registry-for-artifacts |
+| DLL Side-Loading | T1574.002 | analyzing-bootkit-and-rootkit-samples |
+
+### Sub-technique Mapping (T1xxx.xxx)
+
+Where applicable, skills are mapped to sub-techniques for precision. For example:
+
+- `T1566.001` (Spearphishing Attachment) -- analyzing-email-headers-for-phishing-investigation
+- `T1566.002` (Spearphishing Link) -- analyzing-certificate-transparency-for-phishing
+- `T1003.001` (LSASS Memory) -- analyzing-memory-dumps-with-volatility
+
+## ATT&CK Navigator Integration
+
+You can visualize our skill coverage using the [ATT&CK Navigator](https://mitre-attack.github.io/attack-navigator/). To generate a Navigator layer:
+
+1. Use the coverage summary in [`coverage-summary.md`](coverage-summary.md) to identify covered tactics
+2. Import the tactic/technique IDs into a Navigator layer JSON
+3. Color-code by coverage depth (number of skills per technique)
+
+### Suggested Color Scale
+
+| Coverage | Color | Meaning |
+|----------|-------|---------|
+| 0 skills | White | No coverage -- gap |
+| 1-2 skills | Light blue | Basic coverage |
+| 3-5 skills | Medium blue | Moderate coverage |
+| 6+ skills | Dark blue | Strong coverage |
+
+## Skill Tag Convention
+
+Skills relevant to ATT&CK carry these tags in their YAML frontmatter:
+
+- `mitre-attack` -- general ATT&CK relevance (56 skills currently tagged)
+- Technique-specific tags like `privilege-escalation`, `lateral-movement`, `persistence`
+- Tool-specific tags that map to ATT&CK software entries (e.g., `cobalt-strike`, `mimikatz`)
+
+## How to Contribute Mappings
+
+1. **Identify the skill** -- Read the skill's SKILL.md to understand what it teaches
+2. **Find the ATT&CK technique** -- Search [attack.mitre.org](https://attack.mitre.org/) for the matching technique
+3. **Determine offensive vs. defensive** -- Is the skill about performing or detecting/preventing the technique?
+4. **Update the mapping** -- Add the technique ID to the appropriate table in this directory
+5. **Update skill tags** -- Add `mitre-attack` and technique-specific tags to the skill's frontmatter
+6. **Submit a PR** -- Include the ATT&CK technique URL as justification
+
+## References
+
+- [MITRE ATT&CK Enterprise Matrix](https://attack.mitre.org/matrices/enterprise/)
+- [MITRE ATT&CK Navigator](https://mitre-attack.github.io/attack-navigator/)
+- [ATT&CK v15 Release Notes](https://attack.mitre.org/resources/updates/)
+- [MITRE ATT&CK for ICS](https://attack.mitre.org/matrices/ics/) -- relevant for ot-ics-security skills
+- [MITRE ATT&CK for Mobile](https://attack.mitre.org/matrices/mobile/) -- relevant for mobile-security skills
diff --git a/personas/_shared/anthropic-cybersecurity-skills/mappings/mitre-attack/coverage-summary.md b/personas/_shared/anthropic-cybersecurity-skills/mappings/mitre-attack/coverage-summary.md
new file mode 100644
index 0000000..6498dd2
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/mappings/mitre-attack/coverage-summary.md
@@ -0,0 +1,177 @@
+# ATT&CK Coverage Summary
+
+Coverage analysis of the 753 cybersecurity skills mapped to MITRE ATT&CK Enterprise v15 tactics.
+
+## Tactic Coverage Matrix
+
+| ATT&CK Tactic | ID | Relevant Subdomains | Skills Count |
+|---------------|-----|---------------------|--------------|
+| Reconnaissance | TA0043 | threat-intelligence, penetration-testing, red-teaming | ~48 |
+| Resource Development | TA0042 | threat-intelligence, red-teaming | ~30 |
+| Initial Access | TA0001 | web-application-security, phishing-defense, api-security | ~45 |
+| Execution | TA0002 | malware-analysis, endpoint-security, soc-operations | ~32 |
+| Persistence | TA0003 | threat-hunting, digital-forensics, endpoint-security | ~28 |
+| Privilege Escalation | TA0004 | penetration-testing, red-teaming, identity-access-management | ~40 |
+| Defense Evasion | TA0005 | malware-analysis, endpoint-security, threat-hunting | ~25 |
+| Credential Access | TA0006 | identity-access-management, penetration-testing | ~30 |
+| Discovery | TA0007 | penetration-testing, threat-hunting, network-security | ~35 |
+| Lateral Movement | TA0008 | red-teaming, network-security, soc-operations | ~28 |
+| Collection | TA0009 | digital-forensics, threat-hunting | ~22 |
+| Command and Control | TA0011 | threat-intelligence, network-security, soc-operations | ~30 |
+| Exfiltration | TA0010 | threat-hunting, digital-forensics, network-security | ~20 |
+| Impact | TA0040 | ransomware-defense, incident-response, ot-ics-security | ~35 |
+
+## Subdomain-to-Tactic Heat Map
+
+Shows which subdomains contribute skills to each ATT&CK tactic. Intensity indicates relevance (H = High, M = Medium, L = Low).
+
+| Subdomain (skills) | Recon | Res Dev | Init Access | Exec | Persist | Priv Esc | Def Evasion | Cred Access | Disc | Lat Mov | Collect | C2 | Exfil | Impact |
+|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
+| web-application-security (41) | L | - | **H** | M | L | M | L | M | L | - | - | - | - | M |
+| threat-intelligence (43) | **H** | **H** | M | L | L | - | L | - | M | - | - | **H** | L | L |
+| threat-hunting (35) | L | - | M | M | **H** | M | **H** | M | **H** | M | **H** | M | **H** | M |
+| digital-forensics (34) | - | - | L | M | **H** | L | M | L | L | M | **H** | L | M | M |
+| malware-analysis (34) | - | L | M | **H** | **H** | M | **H** | L | L | L | M | **H** | L | M |
+| identity-access-management (33) | - | - | M | L | M | **H** | L | **H** | L | M | - | - | - | - |
+| network-security (33) | M | - | M | L | L | L | L | L | M | **H** | L | **H** | **H** | L |
+| soc-operations (33) | L | - | M | **H** | M | M | M | M | M | M | M | M | M | M |
+| cloud-security (48) | M | M | **H** | M | M | **H** | M | **H** | **H** | M | M | L | M | M |
+| api-security (28) | L | - | **H** | M | L | M | L | **H** | L | - | M | - | M | L |
+| ot-ics-security (28) | M | L | M | M | M | L | L | M | **H** | M | **H** | M | L | **H** |
+| container-security (26) | L | L | M | **H** | M | **H** | **H** | M | M | L | L | L | M | M |
+| incident-response (24) | - | - | M | M | M | M | M | M | L | M | M | M | M | **H** |
+| vulnerability-management (24) | M | - | **H** | M | L | M | L | L | **H** | L | - | - | - | M |
+| penetration-testing (23) | **H** | M | **H** | **H** | M | **H** | M | **H** | **H** | M | M | M | M | L |
+| red-teaming (24) | **H** | **H** | **H** | **H** | **H** | **H** | **H** | **H** | **H** | **H** | **H** | **H** | **H** | **H** |
+| devsecops (16) | L | L | M | M | L | M | L | M | L | - | - | - | - | L |
+| endpoint-security (16) | - | - | M | **H** | **H** | **H** | **H** | M | M | M | M | M | L | M |
+| phishing-defense (16) | M | M | **H** | M | - | - | M | **H** | - | - | M | L | L | L |
+| cryptography (13) | - | - | L | - | - | - | M | **H** | - | - | M | M | **H** | L |
+| zero-trust-architecture (13) | - | - | M | L | L | **H** | L | **H** | L | **H** | L | L | M | - |
+| mobile-security (12) | M | L | **H** | M | M | M | M | M | M | L | M | M | M | L |
+| compliance-governance (5) | L | L | L | - | - | L | - | L | L | - | - | - | - | L |
+| ransomware-defense (5) | - | - | M | M | M | L | M | - | - | - | M | M | L | **H** |
+
+## Key Technique Coverage
+
+High-confidence technique-to-skill mappings based on skill content analysis.
+
+### Initial Access (TA0001) -- 45 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Phishing | T1566 | analyzing-phishing-email-headers, analyzing-certificate-transparency-for-phishing, 14 phishing-defense skills |
+| Exploit Public-Facing Application | T1190 | 41 web-application-security skills, 28 api-security skills |
+| External Remote Services | T1133 | network-security VPN/remote access skills |
+| Valid Accounts | T1078 | identity-access-management credential skills |
+| Supply Chain Compromise | T1195 | analyzing-supply-chain-malware-artifacts, devsecops dependency scanning |
+
+### Execution (TA0002) -- 32 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Command and Scripting Interpreter | T1059 | malware-analysis script analysis skills |
+| Exploitation for Client Execution | T1203 | web-application-security exploit skills |
+| User Execution | T1204 | phishing-defense awareness skills |
+| Container Administration Command | T1609 | container-security skills |
+
+### Persistence (TA0003) -- 28 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Boot or Logon Autostart Execution | T1547 | analyzing-malware-persistence-with-autoruns, analyzing-windows-registry-for-artifacts |
+| Scheduled Task/Job | T1053 | endpoint-security scheduled task skills |
+| Create Account | T1136 | identity-access-management monitoring skills |
+| Implant Internal Image | T1525 | container-security image scanning skills |
+
+### Privilege Escalation (TA0004) -- 40 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Exploitation for Privilege Escalation | T1068 | penetration-testing privilege escalation skills |
+| Access Token Manipulation | T1134 | identity-access-management token skills |
+| Container Escape | T1611 | container-security escape detection skills |
+| Domain Policy Modification | T1484 | identity-access-management AD skills |
+
+### Defense Evasion (TA0005) -- 25 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Obfuscated Files or Information | T1027 | analyzing-packed-malware-with-upx-unpacker, malware deobfuscation skills |
+| Masquerading | T1036 | threat-hunting detection skills |
+| Rootkit | T1014 | analyzing-bootkit-and-rootkit-samples |
+| Indicator Removal | T1070 | digital-forensics anti-forensics skills |
+
+### Credential Access (TA0006) -- 30 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| OS Credential Dumping | T1003 | analyzing-memory-dumps-with-volatility, penetration-testing credential skills |
+| Brute Force | T1110 | identity-access-management authentication skills |
+| Steal Web Session Cookie | T1539 | web-application-security session skills |
+| Unsecured Credentials | T1552 | cloud-security secrets management skills |
+
+### Discovery (TA0007) -- 35 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Network Service Discovery | T1046 | network-security scanning skills, penetration-testing recon |
+| System Information Discovery | T1082 | threat-hunting system enumeration skills |
+| Cloud Infrastructure Discovery | T1580 | cloud-security asset discovery skills |
+| Account Discovery | T1087 | identity-access-management enumeration skills |
+
+### Lateral Movement (TA0008) -- 28 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Remote Services | T1021 | network-security remote access skills |
+| Lateral Tool Transfer | T1570 | threat-hunting lateral movement detection skills |
+| Use Alternate Authentication Material | T1550 | identity-access-management pass-the-hash skills |
+| Exploitation of Remote Services | T1210 | penetration-testing exploitation skills |
+
+### Collection (TA0009) -- 22 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Data from Local System | T1005 | digital-forensics disk/file analysis skills |
+| Data from Network Shared Drive | T1039 | threat-hunting data access monitoring skills |
+| Email Collection | T1114 | analyzing-outlook-pst-for-email-forensics |
+| Screen Capture | T1113 | malware-analysis behavior analysis skills |
+
+### Command and Control (TA0011) -- 30 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Application Layer Protocol | T1071 | analyzing-command-and-control-communication, network-security C2 detection |
+| Encrypted Channel | T1573 | analyzing-network-covert-channels-in-malware |
+| Ingress Tool Transfer | T1105 | analyzing-cobalt-strike-beacon-configuration |
+| Proxy | T1090 | network-security proxy analysis skills |
+
+### Exfiltration (TA0010) -- 20 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Exfiltration Over C2 Channel | T1041 | analyzing-dns-logs-for-exfiltration |
+| Exfiltration Over Alternative Protocol | T1048 | network-security protocol analysis skills |
+| Exfiltration Over Web Service | T1567 | cloud-security data loss prevention skills |
+
+### Impact (TA0040) -- 35 skills
+
+| Technique | ID | Primary Skills |
+|-----------|----|---------------|
+| Data Encrypted for Impact | T1486 | analyzing-ransomware-encryption-mechanisms, 5 ransomware-defense skills |
+| Service Stop | T1489 | incident-response service restoration skills |
+| Inhibit System Recovery | T1490 | ransomware-defense recovery skills |
+| Manipulation of Control | T0831 | ot-ics-security control system skills |
+
+## Coverage Gaps
+
+Areas where additional skills would improve ATT&CK coverage:
+
+| Gap Area | ATT&CK Techniques | Recommendation |
+|----------|-------------------|----------------|
+| Firmware attacks | T1542 (Pre-OS Boot) | Add UEFI/firmware analysis skills |
+| Audio/video capture | T1123, T1125 | Add surveillance detection skills |
+| Cloud-specific lateral movement | T1550.001 (Web Session Cookie in cloud) | Expand cloud-security lateral movement |
+| Hardware additions | T1200 | Add physical security assessment skills |
+| Traffic signaling | T1205 | Add network covert channel detection skills |
diff --git a/personas/_shared/anthropic-cybersecurity-skills/mappings/nist-csf/README.md b/personas/_shared/anthropic-cybersecurity-skills/mappings/nist-csf/README.md
new file mode 100644
index 0000000..965abb8
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/mappings/nist-csf/README.md
@@ -0,0 +1,133 @@
+# NIST Cybersecurity Framework 2.0 Mapping
+
+This directory maps the cybersecurity skills in this repository to the [NIST Cybersecurity Framework (CSF) 2.0](https://www.nist.gov/cyberframework), published February 2024.
+
+## Overview
+
+NIST CSF 2.0 organizes cybersecurity activities into 6 core functions that represent the full lifecycle of managing cybersecurity risk. This mapping enables organizations to:
+
+- **Align skill development** to their CSF implementation tier
+- **Identify training gaps** across the CSF functions
+- **Build role-based learning paths** using CSF categories
+- **Automate compliance mapping** through AI agent queries
+
+## CSF 2.0 Functions and Skill Alignment
+
+### Govern (GV) -- Cybersecurity Risk Management Strategy
+
+Establishing and monitoring the organization's cybersecurity risk management strategy, expectations, and policy.
+
+| Category | ID | Mapped Subdomains | Skills |
+|----------|-----|-------------------|--------|
+| Organizational Context | GV.OC | compliance-governance | 5 |
+| Risk Management Strategy | GV.RM | compliance-governance, vulnerability-management | 29 |
+| Roles, Responsibilities, and Authorities | GV.RR | compliance-governance, identity-access-management | 38 |
+| Policy | GV.PO | compliance-governance, zero-trust-architecture | 18 |
+| Oversight | GV.OV | compliance-governance, soc-operations | 38 |
+| Cybersecurity Supply Chain Risk Management | GV.SC | devsecops, container-security | 42 |
+
+**Primary subdomains:** compliance-governance (5), identity-access-management (33), devsecops (16)
+
+### Identify (ID) -- Understanding Organizational Cybersecurity Risk
+
+Understanding the organization's current cybersecurity risks.
+
+| Category | ID | Mapped Subdomains | Skills |
+|----------|-----|-------------------|--------|
+| Asset Management | ID.AM | cloud-security, container-security, network-security | 107 |
+| Risk Assessment | ID.RA | vulnerability-management, threat-intelligence | 67 |
+| Improvement | ID.IM | soc-operations, compliance-governance | 38 |
+
+**Primary subdomains:** vulnerability-management (24), threat-intelligence (43), cloud-security (48)
+
+### Protect (PR) -- Safeguarding Assets
+
+Using safeguards to prevent or reduce cybersecurity risk.
+
+| Category | ID | Mapped Subdomains | Skills |
+|----------|-----|-------------------|--------|
+| Identity Management, Authentication, and Access Control | PR.AA | identity-access-management, zero-trust-architecture | 46 |
+| Awareness and Training | PR.AT | phishing-defense, compliance-governance | 21 |
+| Data Security | PR.DS | cryptography, cloud-security, api-security | 89 |
+| Platform Security | PR.PS | endpoint-security, container-security, devsecops | 58 |
+| Technology Infrastructure Resilience | PR.IR | network-security, zero-trust-architecture | 46 |
+
+**Primary subdomains:** zero-trust-architecture (13), devsecops (16), identity-access-management (33), cryptography (13)
+
+### Detect (DE) -- Finding and Analyzing Cybersecurity Events
+
+Finding and analyzing possible cybersecurity compromises and anomalies.
+
+| Category | ID | Mapped Subdomains | Skills |
+|----------|-----|-------------------|--------|
+| Continuous Monitoring | DE.CM | soc-operations, threat-hunting, network-security | 101 |
+| Adverse Event Analysis | DE.AE | threat-hunting, malware-analysis, soc-operations | 102 |
+
+**Primary subdomains:** threat-hunting (35), soc-operations (33), malware-analysis (34)
+
+### Respond (RS) -- Taking Action Regarding Detected Incidents
+
+Managing and responding to detected cybersecurity incidents.
+
+| Category | ID | Mapped Subdomains | Skills |
+|----------|-----|-------------------|--------|
+| Incident Management | RS.MA | incident-response, soc-operations | 57 |
+| Incident Analysis | RS.AN | digital-forensics, malware-analysis, threat-intelligence | 111 |
+| Incident Response Reporting and Communication | RS.CO | incident-response, compliance-governance | 29 |
+| Incident Mitigation | RS.MI | incident-response, endpoint-security, network-security | 73 |
+
+**Primary subdomains:** incident-response (24), digital-forensics (34), malware-analysis (34)
+
+### Recover (RC) -- Restoring Capabilities After an Incident
+
+Restoring assets and operations affected by a cybersecurity incident.
+
+| Category | ID | Mapped Subdomains | Skills |
+|----------|-----|-------------------|--------|
+| Incident Recovery Plan Execution | RC.RP | incident-response, ransomware-defense | 29 |
+| Incident Recovery Communication | RC.CO | incident-response, compliance-governance | 29 |
+
+**Primary subdomains:** incident-response (24), ransomware-defense (5)
+
+## Function Coverage Distribution
+
+```
+Govern (GV): ████████████░░░░░░░░ ~54 skills (compliance, IAM, devsecops)
+Identify (ID): ██████████████████░░ ~115 skills (vuln-mgmt, threat-intel, cloud)
+Protect (PR): ████████████████████ ~160 skills (IAM, ZTA, devsecops, crypto)
+Detect (DE): ████████████████░░░░ ~102 skills (threat-hunting, SOC, malware)
+Respond (RS): ██████████████████░░ ~111 skills (IR, forensics, malware)
+Recover (RC): ████░░░░░░░░░░░░░░░░ ~29 skills (IR recovery, ransomware)
+```
+
+## How to Use This Mapping
+
+### For Organizations
+
+1. Determine your target CSF implementation tier (Partial, Risk Informed, Repeatable, Adaptive)
+2. Identify your CSF function priorities
+3. Use the category tables above to find relevant skill subdomains
+4. Deploy skills from those subdomains to your team's training plan
+
+### For AI Agents
+
+Query skills by CSF function using subdomain filters:
+
+```
+# Find all Detect (DE) function skills
+Filter: subdomain IN (threat-hunting, soc-operations, malware-analysis)
+
+# Find all Protect (PR) function skills
+Filter: subdomain IN (identity-access-management, zero-trust-architecture, devsecops, cryptography)
+```
+
+### For Security Teams
+
+Use the alignment table in [`csf-alignment.md`](csf-alignment.md) for a complete subdomain-to-category cross-reference.
+
+## References
+
+- [NIST CSF 2.0 (February 2024)](https://www.nist.gov/cyberframework)
+- [NIST SP 800-53 Rev. 5 Control Mapping](https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final)
+- [CSF 2.0 Quick Start Guides](https://www.nist.gov/cyberframework/getting-started)
+- [CSF 2.0 Reference Tool](https://csrc.nist.gov/Projects/Cybersecurity-Framework/Filters)
diff --git a/personas/_shared/anthropic-cybersecurity-skills/mappings/nist-csf/csf-alignment.md b/personas/_shared/anthropic-cybersecurity-skills/mappings/nist-csf/csf-alignment.md
new file mode 100644
index 0000000..7b376f9
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/mappings/nist-csf/csf-alignment.md
@@ -0,0 +1,102 @@
+# NIST CSF 2.0 Alignment Table
+
+Complete mapping of each skill subdomain to NIST CSF 2.0 functions and categories.
+
+## Subdomain-to-CSF Alignment
+
+| Subdomain | Skills | GV | ID | PR | PR | DE | RS | RC |
+|-----------|--------|-----|-----|-----|-----|-----|-----|-----|
+| | | Govern | Identify | Protect | Protect | Detect | Respond | Recover |
+
+### Detailed Alignment
+
+| Subdomain (Skills) | Primary CSF Function | CSF Categories | Alignment Rationale |
+|---------------------|---------------------|----------------|---------------------|
+| api-security (28) | Protect (PR) | PR.DS, PR.PS | API hardening, authentication, input validation |
+| cloud-security (48) | Identify (ID), Protect (PR) | ID.AM, PR.DS, PR.PS, PR.IR | Cloud asset management, data protection, infrastructure resilience |
+| compliance-governance (5) | Govern (GV) | GV.OC, GV.RM, GV.RR, GV.PO, GV.OV | Risk strategy, policy, organizational oversight |
+| container-security (26) | Protect (PR) | PR.PS, GV.SC | Platform security, supply chain risk management |
+| cryptography (13) | Protect (PR) | PR.DS | Data confidentiality and integrity at rest and in transit |
+| devsecops (16) | Protect (PR), Govern (GV) | PR.PS, GV.SC | Secure development lifecycle, supply chain security |
+| digital-forensics (34) | Respond (RS) | RS.AN, RS.MA | Incident analysis, evidence collection and examination |
+| endpoint-security (16) | Protect (PR), Detect (DE) | PR.PS, DE.CM, DE.AE | Endpoint hardening, continuous monitoring, threat detection |
+| identity-access-management (33) | Protect (PR), Govern (GV) | PR.AA, GV.RR | Identity lifecycle, authentication, authorization, access governance |
+| incident-response (24) | Respond (RS), Recover (RC) | RS.MA, RS.AN, RS.MI, RS.CO, RC.RP, RC.CO | Full incident lifecycle from detection through recovery |
+| malware-analysis (34) | Detect (DE), Respond (RS) | DE.AE, RS.AN | Adverse event analysis, reverse engineering, threat characterization |
+| mobile-security (12) | Protect (PR) | PR.PS, PR.DS | Mobile platform security, application data protection |
+| network-security (33) | Protect (PR), Detect (DE) | PR.IR, DE.CM | Network infrastructure resilience, traffic monitoring |
+| ot-ics-security (28) | Protect (PR), Detect (DE) | PR.PS, PR.IR, DE.CM | Industrial control system protection and monitoring |
+| penetration-testing (23) | Identify (ID) | ID.RA | Risk assessment through offensive security testing |
+| phishing-defense (16) | Protect (PR), Detect (DE) | PR.AT, DE.CM, DE.AE | Security awareness training, phishing detection |
+| ransomware-defense (5) | Respond (RS), Recover (RC) | RS.MI, RC.RP | Ransomware mitigation and recovery planning |
+| red-teaming (24) | Identify (ID) | ID.RA, ID.IM | Adversary simulation for risk assessment and program improvement |
+| soc-operations (33) | Detect (DE), Respond (RS) | DE.CM, DE.AE, RS.MA | Continuous monitoring, alert triage, incident management |
+| threat-hunting (35) | Detect (DE) | DE.CM, DE.AE | Proactive threat detection, hypothesis-driven analysis |
+| threat-intelligence (43) | Identify (ID), Detect (DE) | ID.RA, DE.AE | Threat landscape understanding, intelligence-driven detection |
+| vulnerability-management (24) | Identify (ID) | ID.RA, GV.RM | Vulnerability identification, risk assessment, remediation prioritization |
+| web-application-security (41) | Protect (PR), Identify (ID) | PR.DS, PR.PS, ID.RA | Application security testing and hardening |
+| zero-trust-architecture (13) | Protect (PR) | PR.AA, PR.IR | Zero trust access control and network segmentation |
+
+## CSF Category Coverage Summary
+
+### Govern (GV)
+
+| Category | ID | Description | Subdomain Coverage |
+|----------|-----|------------|-------------------|
+| Organizational Context | GV.OC | Understanding the organizational mission and stakeholder expectations | compliance-governance |
+| Risk Management Strategy | GV.RM | Risk management priorities, constraints, and appetite | compliance-governance, vulnerability-management |
+| Roles, Responsibilities, and Authorities | GV.RR | Cybersecurity roles and authorities are established | compliance-governance, identity-access-management |
+| Policy | GV.PO | Organizational cybersecurity policy is established | compliance-governance, zero-trust-architecture |
+| Oversight | GV.OV | Results of cybersecurity activities are reviewed | compliance-governance, soc-operations |
+| Cybersecurity Supply Chain Risk Management | GV.SC | Supply chain risks are managed | devsecops, container-security |
+
+### Identify (ID)
+
+| Category | ID | Description | Subdomain Coverage |
+|----------|-----|------------|-------------------|
+| Asset Management | ID.AM | Assets that enable the organization are identified and managed | cloud-security, container-security, network-security |
+| Risk Assessment | ID.RA | The cybersecurity risk to the organization is understood | vulnerability-management, threat-intelligence, penetration-testing, red-teaming |
+| Improvement | ID.IM | Improvements to organizational cybersecurity are identified | soc-operations, red-teaming, compliance-governance |
+
+### Protect (PR)
+
+| Category | ID | Description | Subdomain Coverage |
+|----------|-----|------------|-------------------|
+| Identity Management, Authentication, and Access Control | PR.AA | Access is limited to authorized users, services, and hardware | identity-access-management, zero-trust-architecture |
+| Awareness and Training | PR.AT | Personnel are provided cybersecurity awareness and training | phishing-defense, compliance-governance |
+| Data Security | PR.DS | Data are managed consistent with the organization's risk strategy | cryptography, cloud-security, api-security |
+| Platform Security | PR.PS | Hardware, software, and services are managed consistent with risk strategy | endpoint-security, container-security, devsecops, ot-ics-security |
+| Technology Infrastructure Resilience | PR.IR | Security architectures are managed to protect asset confidentiality, integrity, and availability | network-security, zero-trust-architecture, ot-ics-security |
+
+### Detect (DE)
+
+| Category | ID | Description | Subdomain Coverage |
+|----------|-----|------------|-------------------|
+| Continuous Monitoring | DE.CM | Assets are monitored to find anomalies and indicators of compromise | soc-operations, threat-hunting, network-security, endpoint-security |
+| Adverse Event Analysis | DE.AE | Anomalies and potential adverse events are analyzed | threat-hunting, malware-analysis, soc-operations, threat-intelligence |
+
+### Respond (RS)
+
+| Category | ID | Description | Subdomain Coverage |
+|----------|-----|------------|-------------------|
+| Incident Management | RS.MA | Responses to detected incidents are managed | incident-response, soc-operations |
+| Incident Analysis | RS.AN | Investigations are conducted to understand the incident | digital-forensics, malware-analysis, threat-intelligence |
+| Incident Response Reporting and Communication | RS.CO | Response activities are coordinated with internal and external stakeholders | incident-response, compliance-governance |
+| Incident Mitigation | RS.MI | Activities are performed to prevent expansion and mitigate effects | incident-response, endpoint-security, network-security |
+
+### Recover (RC)
+
+| Category | ID | Description | Subdomain Coverage |
+|----------|-----|------------|-------------------|
+| Incident Recovery Plan Execution | RC.RP | Restoration activities are performed to ensure operational availability | incident-response, ransomware-defense |
+| Incident Recovery Communication | RC.CO | Restoration activities are coordinated with internal and external parties | incident-response, compliance-governance |
+
+## Gap Analysis
+
+| CSF Category | Current Coverage | Gap |
+|-------------|-----------------|-----|
+| GV.OC | Low (5 skills) | Need more organizational security context and mission alignment skills |
+| GV.PO | Low | Need dedicated policy development and management skills |
+| PR.AT | Moderate (16 skills) | Could expand security awareness training beyond phishing |
+| RC.RP | Low (29 skills) | Need more disaster recovery and business continuity skills |
+| RC.CO | Low | Need dedicated incident communication and stakeholder management skills |
diff --git a/personas/_shared/anthropic-cybersecurity-skills/mappings/owasp/README.md b/personas/_shared/anthropic-cybersecurity-skills/mappings/owasp/README.md
new file mode 100644
index 0000000..78fc8c3
--- /dev/null
+++ b/personas/_shared/anthropic-cybersecurity-skills/mappings/owasp/README.md
@@ -0,0 +1,177 @@
+# OWASP Top 10 (2025) Mapping
+
+This directory maps the cybersecurity skills in this repository to the [OWASP Top 10](https://owasp.org/www-project-top-ten/) categories for web application security risks.
+
+## Overview
+
+The OWASP Top 10 represents the most critical security risks to web applications. This mapping connects hands-on skills to each risk category, enabling teams to build targeted training programs for secure development and application security testing.
+
+## OWASP Top 10 2025 Skill Mapping
+
+### A01:2025 -- Broken Access Control
+
+Restrictions on what authenticated users are allowed to do are not properly enforced.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| web-application-security | 41 | IDOR, privilege escalation, path traversal, CORS misconfiguration |
+| identity-access-management | 33 | RBAC, ABAC, session management, OAuth/OIDC flaws |
+| api-security | 28 | Broken object level authorization (BOLA), function level authorization |
+| zero-trust-architecture | 13 | Least privilege enforcement, microsegmentation |
+
+**Example skills:** Implementing RBAC, testing for IDOR vulnerabilities, configuring OAuth 2.0 securely, enforcing API authorization policies.
+
+### A02:2025 -- Cryptographic Failures
+
+Failures related to cryptography that lead to exposure of sensitive data.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| cryptography | 13 | TLS configuration, key management, hashing, encryption at rest |
+| web-application-security | 41 | HTTPS enforcement, cookie security flags, certificate validation |
+| cloud-security | 48 | KMS configuration, secrets management, encryption in transit |
+| api-security | 28 | API transport security, token encryption |
+
+**Example skills:** Configuring TLS 1.3, implementing envelope encryption with KMS, securing JWT tokens, certificate pinning.
+
+### A03:2025 -- Injection
+
+User-supplied data is sent to an interpreter as part of a command or query without proper validation.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| web-application-security | 41 | SQL injection, XSS, command injection, LDAP injection |
+| api-security | 28 | GraphQL injection, NoSQL injection, header injection |
+| devsecops | 16 | SAST/DAST scanning, input validation, parameterized queries |
+| penetration-testing | 23 | Injection testing, payload crafting, WAF bypass |
+
+**Example skills:** Exploiting and remediating SQL injection, testing for stored/reflected XSS, configuring parameterized queries, SAST pipeline integration.
+
+### A04:2025 -- Insecure Design
+
+Risks related to design and architectural flaws, calling for more use of threat modeling and secure design patterns.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| devsecops | 16 | Threat modeling, secure SDLC, security requirements |
+| zero-trust-architecture | 13 | Zero trust design principles, defense in depth |
+| compliance-governance | 5 | Security architecture review, risk assessment frameworks |
+| web-application-security | 41 | Business logic flaws, trust boundary definition |
+
+**Example skills:** Conducting threat modeling with STRIDE, implementing secure design patterns, defining trust boundaries, security architecture review.
+
+### A05:2025 -- Security Misconfiguration
+
+Missing or incorrect security hardening across the application stack.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| cloud-security | 48 | Cloud service misconfiguration, IAM policy errors, S3 bucket exposure |
+| container-security | 26 | Container hardening, Kubernetes RBAC, pod security policies |
+| network-security | 33 | Firewall rules, segmentation errors, default credentials |
+| endpoint-security | 16 | OS hardening, unnecessary services, default configurations |
+
+**Example skills:** Auditing AWS S3 bucket permissions, hardening Kubernetes clusters, configuring security headers, CIS benchmark compliance.
+
+### A06:2025 -- Vulnerable and Outdated Components
+
+Using components with known vulnerabilities or that are no longer maintained.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| vulnerability-management | 24 | CVE tracking, vulnerability scanning, patch management |
+| devsecops | 16 | SCA scanning, dependency management, SBOM generation |
+| container-security | 26 | Image scanning, base image updates, registry security |
+| web-application-security | 41 | Third-party library vulnerabilities, framework updates |
+
+**Example skills:** Running Trivy container scans, implementing SCA in CI/CD, generating and analyzing SBOMs, CVE prioritization with CVSS/EPSS.
+
+### A07:2025 -- Identification and Authentication Failures
+
+Weaknesses in authentication and session management.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| identity-access-management | 33 | MFA implementation, password policies, session fixation |
+| web-application-security | 41 | Credential stuffing defense, brute force protection |
+| api-security | 28 | API key management, OAuth token handling, JWT validation |
+| phishing-defense | 16 | Credential phishing prevention, anti-phishing controls |
+
+**Example skills:** Implementing FIDO2/WebAuthn, configuring adaptive MFA, securing API authentication, detecting credential stuffing attacks.
+
+### A08:2025 -- Software and Data Integrity Failures
+
+Failures related to code and infrastructure that do not protect against integrity violations.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| devsecops | 16 | CI/CD pipeline security, code signing, artifact integrity |
+| container-security | 26 | Image signing, admission control, supply chain verification |
+| cryptography | 13 | Digital signatures, integrity hashing, code signing certificates |
+| vulnerability-management | 24 | Supply chain risk, dependency integrity verification |
+
+**Example skills:** Implementing Sigstore for container signing, securing CI/CD pipelines, verifying software supply chain integrity, content trust enforcement.
+
+### A09:2025 -- Security Logging and Monitoring Failures
+
+Insufficient logging, detection, monitoring, and active response.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| soc-operations | 33 | SIEM configuration, log aggregation, alert tuning |
+| threat-hunting | 35 | Log analysis, detection engineering, hypothesis-driven hunting |
+| incident-response | 24 | Incident detection, log-based investigation, response automation |
+| network-security | 33 | Network monitoring, flow analysis, IDS/IPS tuning |
+
+**Example skills:** Analyzing security logs with Splunk, writing Sigma detection rules, configuring SIEM correlation rules, implementing centralized logging.
+
+### A10:2025 -- Server-Side Request Forgery (SSRF)
+
+Fetching a remote resource without validating the user-supplied URL.
+
+| Relevant Subdomains | Skills | Key Topics |
+|---------------------|--------|------------|
+| web-application-security | 41 | SSRF exploitation, URL validation, allowlisting |
+| cloud-security | 48 | IMDS exploitation, cloud metadata access, VPC endpoint security |
+| api-security | 28 | API-to-API SSRF, webhook validation |
+| penetration-testing | 23 | SSRF detection and exploitation techniques |
+
+**Example skills:** Testing for SSRF vulnerabilities, securing cloud metadata endpoints (IMDSv2), implementing URL validation and allowlisting, detecting SSRF in API integrations.
+
+## Cross-Reference: OWASP to ATT&CK
+
+| OWASP Category | Related ATT&CK Techniques |
+|---------------|--------------------------|
+| A01: Broken Access Control | T1078 (Valid Accounts), T1548 (Abuse Elevation Control) |
+| A02: Cryptographic Failures | T1557 (Adversary-in-the-Middle), T1040 (Network Sniffing) |
+| A03: Injection | T1190 (Exploit Public-Facing App), T1059 (Command and Scripting) |
+| A04: Insecure Design | T1195 (Supply Chain Compromise), cross-cutting |
+| A05: Security Misconfiguration | T1574 (Hijack Execution Flow), T1190 |
+| A06: Vulnerable Components | T1190 (Exploit Public-Facing App), T1195 |
+| A07: Authentication Failures | T1110 (Brute Force), T1539 (Steal Web Session Cookie) |
+| A08: Integrity Failures | T1195 (Supply Chain Compromise), T1554 (Compromise Client Software) |
+| A09: Logging Failures | T1070 (Indicator Removal), T1562 (Impair Defenses) |
+| A10: SSRF | T1190 (Exploit Public-Facing App) |
+
+## Cross-Reference: OWASP to NIST CSF 2.0
+
+| OWASP Category | NIST CSF Functions | CSF Categories |
+|---------------|-------------------|----------------|
+| A01: Broken Access Control | Protect | PR.AA |
+| A02: Cryptographic Failures | Protect | PR.DS |
+| A03: Injection | Protect, Detect | PR.DS, DE.AE |
+| A04: Insecure Design | Govern, Protect | GV.RM, PR.PS |
+| A05: Security Misconfiguration | Protect | PR.PS, PR.IR |
+| A06: Vulnerable Components | Identify, Govern | ID.RA, GV.SC |
+| A07: Authentication Failures | Protect | PR.AA |
+| A08: Integrity Failures | Protect, Govern | PR.DS, GV.SC |
+| A09: Logging Failures | Detect | DE.CM, DE.AE |
+| A10: SSRF | Protect, Detect | PR.DS, DE.AE |
+
+## References
+
+- [OWASP Top 10 Project](https://owasp.org/www-project-top-ten/)
+- [OWASP API Security Top 10](https://owasp.org/API-Security/) -- relevant for api-security subdomain
+- [OWASP Mobile Top 10](https://owasp.org/www-project-mobile-top-10/) -- relevant for mobile-security subdomain
+- [OWASP Testing Guide](https://owasp.org/www-project-web-security-testing-guide/)
+- [OWASP ASVS](https://owasp.org/www-project-application-security-verification-standard/) -- Application Security Verification Standard
diff --git a/personas/_shared/community-skills/olla/SKILL.md b/personas/_shared/community-skills/olla/SKILL.md
new file mode 100644
index 0000000..00f0aea
--- /dev/null
+++ b/personas/_shared/community-skills/olla/SKILL.md
@@ -0,0 +1,370 @@
+---
+name: olla
+description: Configure and manage Olla LLM proxy gateway — load balancing, model routing, API translation (Anthropic<>OpenAI), health checking, and multi-backend orchestration for local LLM inference. Use when setting up Olla proxy, configuring backends (Ollama, vLLM, LM Studio, llama.cpp, SGLang, LiteLLM), debugging routing issues, or connecting Claude Code to local models via Olla.
+allowed-tools: Bash(*), Read(*), Write(*), Edit(*)
+---
+
+# Olla — LLM Proxy Gateway
+
+Olla is a high-performance LLM proxy gateway written in Go that unifies multiple local LLM backends behind a single endpoint with intelligent routing, load balancing, health checking, and API translation.
+
+**Repository**: https://github.com/thushan/olla
+**Docs**: https://thushan.github.io/olla/
+**Default Port**: 40114 (mnemonic: "4 OLLA")
+
+## Installation
+
+```bash
+# Script install (Linux/macOS)
+bash <(curl -s https://raw.githubusercontent.com/thushan/olla/main/install.sh)
+
+# Go install
+go install github.com/thushan/olla@latest
+
+# Docker
+docker pull ghcr.io/thushan/olla:latest
+docker run -t --name olla -p 40114:40114 ghcr.io/thushan/olla:latest
+
+# Build from source
+git clone https://github.com/thushan/olla.git && cd olla && make build-release
+# Binary: ./bin/olla
+```
+
+Verify: `olla --version` | Health: `curl http://localhost:40114/internal/health`
+
+## Core Concepts
+
+### Proxy Engines
+- **Sherpa** (default): Simple, shared HTTP transport. Good for dev, <100 concurrent users, lower memory.
+- **Olla**: Per-endpoint connection pools, advanced circuit breaker. Production, high throughput, streaming-heavy.
+
+### Load Balancing Strategies
+- **priority** (default): Routes to highest-priority healthy endpoint. Best for primary/backup hierarchies.
+- **round-robin**: Even distribution across healthy endpoints. Best for homogeneous servers.
+- **least-connections**: Routes to endpoint with fewest active connections. Best for variable request durations/streaming.
+
+Health-aware weighting: healthy=1.0, busy=0.3, warming=0.1, unhealthy/unknown=0.
+
+### Model Routing
+- **strict** (default): Only route to endpoints known to have the model. 404 if not found.
+- **optimistic**: Try any healthy endpoint if model not found. Prioritizes availability.
+- **discovery**: Refresh model catalog before routing. Adds latency but ensures freshness.
+
+Fallback behavior: `compatible_only` (reject if not found), `all` (any healthy), `none` (always reject).
+
+### Model Aliases
+Map a virtual model name to different actual names across backends:
+```yaml
+model_aliases:
+ my-llama:
+ - "llama3.1:8b" # Ollama
+ - llama-3.1-8b-instruct # LM Studio
+ - Meta-Llama-3.1-8B-Instruct.gguf # llama.cpp
+```
+
+### API Translation (Anthropic <> OpenAI)
+Three-stage: Request translation -> Backend processing -> Response translation.
+Supports streaming SSE, tool use, vision. Overhead: 1-5ms (translation), ~0ms (passthrough).
+
+**Passthrough mode**: When backend natively supports Anthropic (vLLM v0.11.1+, llama.cpp b4847+, LM Studio v0.4.1+, Ollama v0.14.0+), Olla bypasses translation entirely. Header: `X-Olla-Mode: passthrough`.
+
+### Health Checking & Circuit Breaker
+- Continuous monitoring with configurable intervals (default: 5s)
+- Exponential backoff on failures (2x, 4x, 8x... capped at 60s)
+- Circuit breaker: Closed -> Open (3 failures) -> Half-Open (30s, test traffic) -> Closed
+- Auto model discovery on recovery
+- States: Healthy, Busy, Warming, Offline, Unhealthy
+
+## Configuration
+
+Config search order: `--config` flag > `OLLA_CONFIG_FILE` env > `config/config.local.yaml` > `config/config.yaml` > `config.yaml` > `default.yaml`
+
+Best practice: Create `config/config.local.yaml` with only overrides.
+
+### Minimal Config Example
+```yaml
+server:
+ host: "localhost"
+ port: 40114
+
+proxy:
+ engine: "sherpa"
+ load_balancer: "priority"
+
+discovery:
+ type: "static"
+ static:
+ endpoints:
+ - url: "http://localhost:11434"
+ name: "local-ollama"
+ type: "ollama"
+ priority: 100
+```
+
+### Full Config Reference
+
+#### Server
+```yaml
+server:
+ host: "localhost" # Bind address
+ port: 40114 # Listen port
+ read_timeout: 30s
+ write_timeout: 0s # MUST be 0s for streaming
+ shutdown_timeout: 10s
+ idle_timeout: 0s
+ request_logging: true
+ request_limits:
+ max_body_size: 104857600 # 100MB
+ max_header_size: 1048576 # 1MB
+ rate_limits:
+ global_requests_per_minute: 1000
+ per_ip_requests_per_minute: 100
+ health_requests_per_minute: 1000
+ burst_size: 50
+ cleanup_interval: 5m
+ trust_proxy_headers: false
+ trusted_proxy_cidrs: ["127.0.0.0/8", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16"]
+```
+
+#### Proxy
+```yaml
+proxy:
+ engine: "sherpa" # sherpa | olla
+ profile: "auto" # auto | streaming | standard
+ load_balancer: "priority" # priority | round-robin | least-connections
+ connection_timeout: 30s
+ response_timeout: 600s # 10 min default
+ read_timeout: 120s
+ stream_buffer_size: 8192 # 8KB (sherpa), 65536 (olla recommended)
+ profile_filter:
+ include: [] # glob patterns
+ exclude: []
+```
+
+#### Discovery & Endpoints
+```yaml
+discovery:
+ type: "static"
+ refresh_interval: 30s
+ static:
+ endpoints:
+ - url: "http://localhost:11434"
+ name: "local-ollama"
+ type: "ollama" # ollama|lm-studio|vllm|sglang|llamacpp|lemonade|litellm|openai|docker-model-runner
+ priority: 100 # 0-100, higher = preferred
+ preserve_path: false
+ health_check_url: "" # auto-detected per type
+ model_url: "" # auto-detected per type
+ check_interval: 5s
+ check_timeout: 2s
+ model_discovery:
+ enabled: true
+ interval: 5m
+ timeout: 30s
+ concurrent_workers: 5
+ retry_attempts: 3
+ retry_backoff: 1s
+```
+
+#### Model Registry & Routing
+```yaml
+model_registry:
+ type: "memory"
+ enable_unifier: true
+ routing_strategy:
+ type: "strict" # strict | optimistic | discovery
+ options:
+ fallback_behavior: "compatible_only" # compatible_only | all | none
+ discovery_timeout: 2s
+ discovery_refresh_on_miss: false
+ unification:
+ enabled: true
+ stale_threshold: 24h
+ cleanup_interval: 5m
+ cache_ttl: 10m
+
+model_aliases:
+ alias-name:
+ - "backend1-model-name"
+ - "backend2-model-name"
+```
+
+#### Translators
+```yaml
+translators:
+ anthropic:
+ enabled: true
+ passthrough_enabled: true
+ max_message_size: 10485760 # 10MB
+ inspector:
+ enabled: false
+ output_dir: "logs/inspector/anthropic"
+ session_header: "X-Session-ID"
+```
+
+#### Logging & Engineering
+```yaml
+logging:
+ level: "info" # debug | info | warn | error
+ format: "json" # json | text
+ output: "stdout" # stdout | file
+
+engineering:
+ show_nerdstats: false # Memory/GC stats on shutdown
+```
+
+### Environment Variables
+Pattern: `OLLA__` (uppercase, underscores)
+```bash
+OLLA_SERVER_PORT=8080
+OLLA_PROXY_ENGINE=olla
+OLLA_LOG_LEVEL=debug
+OLLA_CONFIG_FILE=/path/to/config.yaml
+```
+
+## Claude Code Integration
+
+Connect Claude Code to local models through Olla's Anthropic API translation:
+
+```bash
+export ANTHROPIC_BASE_URL="http://localhost:40114/olla/anthropic"
+export ANTHROPIC_API_KEY="not-really-needed"
+export ANTHROPIC_MODEL="openai/gpt-oss-120b" # or your model name
+export ANTHROPIC_SMALL_FAST_MODEL="${ANTHROPIC_MODEL}"
+export ANTHROPIC_DEFAULT_HAIKU_MODEL="${ANTHROPIC_MODEL}"
+export ANTHROPIC_DEFAULT_SONNET_MODEL="${ANTHROPIC_MODEL}"
+export ANTHROPIC_DEFAULT_OPUS_MODEL="${ANTHROPIC_MODEL}"
+export CLAUDE_CODE_DISABLE_NONESSENTIAL_TRAFFIC=1
+export API_TIMEOUT_MS=3000000
+```
+
+**Recommended models for Claude Code**: qwen2.5-coder:32b, deepseek-coder-v2, codellama:34b, llama3.3, qwen3:32b
+
+### Docker Compose Quick Setup
+```yaml
+# compose.yaml
+services:
+ ollama:
+ image: ollama/ollama
+ container_name: ollama
+ ports: ["11434:11434"]
+ volumes: ["ollama_data:/root/.ollama"]
+
+ olla:
+ image: ghcr.io/thushan/olla:latest
+ container_name: olla
+ ports: ["40114:40114"]
+ volumes: ["./olla.yaml:/app/config/config.local.yaml"]
+ depends_on: [ollama]
+
+volumes:
+ ollama_data:
+```
+
+For Docker: set `server.host: "0.0.0.0"` to bind all interfaces.
+
+## API Endpoints
+
+### System
+| Endpoint | Method | Description |
+|----------|--------|-------------|
+| `/internal/health` | GET | Health verification |
+| `/internal/status` | GET | System metrics |
+| `/internal/status/endpoints` | GET | Backend availability |
+| `/internal/status/models` | GET | Model registry |
+| `/internal/stats/models` | GET | Usage by model |
+| `/internal/stats/translators` | GET | Translator performance |
+| `/internal/process` | GET | Runtime info |
+
+### Unified Models
+| Endpoint | Method | Description |
+|----------|--------|-------------|
+| `/olla/models` | GET | All models across all providers |
+
+### Provider-Specific Routes
+| Provider | Route Prefix |
+|----------|-------------|
+| Ollama | `/olla/ollama/*` |
+| LM Studio | `/olla/lmstudio/*` |
+| OpenAI | `/olla/openai/*` |
+| vLLM | `/olla/vllm/*` |
+| SGLang | `/olla/sglang/*` |
+| LiteLLM | `/olla/litellm/*` |
+| llama.cpp | `/olla/llamacpp/*` |
+| Lemonade | `/olla/lemonade/*` |
+
+### Anthropic Translation
+| Endpoint | Method | Description |
+|----------|--------|-------------|
+| `/olla/anthropic/v1/messages` | POST | Chat (streaming supported) |
+| `/olla/anthropic/v1/models` | GET | List models |
+| `/olla/anthropic/v1/messages/count_tokens` | POST | Token estimation |
+
+### Response Headers
+- `X-Olla-Request-ID` — Unique request ID
+- `X-Olla-Endpoint` — Selected backend
+- `X-Olla-Model` — Model identifier
+- `X-Olla-Backend-Type` — Provider type
+- `X-Olla-Response-Time` — Processing duration
+- `X-Olla-Routing-Strategy` — Active strategy
+- `X-Olla-Routing-Decision` — routed/fallback/rejected
+- `X-Olla-Mode` — "passthrough" when native Anthropic format
+
+## Troubleshooting
+
+```bash
+# Health check
+curl http://localhost:40114/internal/health
+
+# List available models
+curl http://localhost:40114/olla/anthropic/v1/models | jq
+
+# Check backend health
+curl http://localhost:40114/internal/status/endpoints | jq
+
+# Test streaming
+curl -N -X POST http://localhost:40114/olla/anthropic/v1/messages \
+ -H "Content-Type: application/json" \
+ -d '{"model":"llama4:latest","max_tokens":50,"messages":[{"role":"user","content":"Count to 5"}],"stream":true}'
+
+# Translator stats
+curl http://localhost:40114/internal/stats/translators | jq
+
+# Debug logging
+OLLA_LOG_LEVEL=debug olla --config config.yaml
+```
+
+### Common Issues
+- **Port conflict**: Set `OLLA_SERVER_PORT` or change config
+- **Streaming broken**: Ensure `server.write_timeout: 0s`
+- **Docker can't connect**: Set `server.host: "0.0.0.0"`
+- **Model not found**: Check routing strategy (try `optimistic`), verify with `/olla/models`
+- **Slow responses**: Switch to `olla` engine, increase `stream_buffer_size`
+
+## Supported Backends
+
+| Backend | Type Key | Notes |
+|---------|----------|-------|
+| Ollama | `ollama` | Most common local setup |
+| LM Studio | `lm-studio` | GUI-based, model unification |
+| vLLM | `vllm` | High-perf, production grade |
+| vLLM-MLX | `vllm-mlx` | Apple Silicon via MLX |
+| SGLang | `sglang` | RadixAttention, vision |
+| llama.cpp | `llamacpp` | GGUF, CPU-first, edge |
+| Lemonade SDK | `lemonade` | AMD Ryzen AI |
+| LiteLLM | `litellm` | 100+ cloud providers |
+| Docker Model Runner | `docker-model-runner` | OCI model distribution |
+| OpenAI-compatible | `openai` | Generic fallback |
+
+## Development
+
+```bash
+git clone https://github.com/thushan/olla.git && cd olla
+make deps # Install dependencies
+make dev # Build with hot-reload
+make test # Run tests
+make ready # Pre-commit checks (fmt + lint + test)
+make bench # Benchmarks
+```
+
+Architecture: Hexagonal (ports & adapters) — `internal/core/` (domain), `internal/adapter/` (infra), `internal/app/` (HTTP handlers).
diff --git a/personas/_shared/community-skills/olla/references/olla-docs-links.md b/personas/_shared/community-skills/olla/references/olla-docs-links.md
new file mode 100644
index 0000000..cfbeac6
--- /dev/null
+++ b/personas/_shared/community-skills/olla/references/olla-docs-links.md
@@ -0,0 +1,87 @@
+# Olla Documentation Reference Links
+
+## Official Documentation
+- Home: https://thushan.github.io/olla/
+- Demo: https://thushan.github.io/olla/demo/
+- FAQ: https://thushan.github.io/olla/faq/
+- Usage: https://thushan.github.io/olla/usage/
+- About: https://thushan.github.io/olla/about/
+
+## Getting Started
+- Installation: https://thushan.github.io/olla/getting-started/installation/
+- Quickstart: https://thushan.github.io/olla/getting-started/quickstart/
+
+## Concepts
+- Overview: https://thushan.github.io/olla/concepts/overview/
+- Load Balancing: https://thushan.github.io/olla/concepts/load-balancing/
+- Model Routing: https://thushan.github.io/olla/concepts/model-routing/
+- Model Aliases: https://thushan.github.io/olla/concepts/model-aliases/
+- Model Unification: https://thushan.github.io/olla/concepts/model-unification/
+- Health Checking: https://thushan.github.io/olla/concepts/health-checking/
+- API Translation: https://thushan.github.io/olla/concepts/api-translation/
+- Proxy Engines: https://thushan.github.io/olla/concepts/proxy-engines/
+- Proxy Profiles: https://thushan.github.io/olla/concepts/proxy-profiles/
+- Profile System: https://thushan.github.io/olla/concepts/profile-system/
+- Provider Metrics: https://thushan.github.io/olla/concepts/provider-metrics/
+
+## Configuration
+- Overview: https://thushan.github.io/olla/configuration/overview/
+- Filters: https://thushan.github.io/olla/configuration/filters/
+- Reference: https://thushan.github.io/olla/configuration/reference/
+- Examples: https://thushan.github.io/olla/configuration/examples/
+- Best Practices - Configuration: https://thushan.github.io/olla/configuration/practices/configuration/
+- Best Practices - Security: https://thushan.github.io/olla/configuration/practices/security/
+- Best Practices - Performance: https://thushan.github.io/olla/configuration/practices/performance/
+- Best Practices - Monitoring: https://thushan.github.io/olla/configuration/practices/monitoring/
+
+## Integrations
+- Overview: https://thushan.github.io/olla/integrations/overview/
+
+### Backend
+- Ollama: https://thushan.github.io/olla/integrations/backend/ollama/
+- LM Studio: https://thushan.github.io/olla/integrations/backend/lmstudio/
+- vLLM: https://thushan.github.io/olla/integrations/backend/vllm/
+- vLLM-MLX: https://thushan.github.io/olla/integrations/backend/vllm-mlx/
+- SGLang: https://thushan.github.io/olla/integrations/backend/sglang/
+- Lemonade SDK: https://thushan.github.io/olla/integrations/backend/lemonade/
+- LiteLLM: https://thushan.github.io/olla/integrations/backend/litellm/
+- llama.cpp: https://thushan.github.io/olla/integrations/backend/llamacpp/
+- Docker Model Runner: https://thushan.github.io/olla/integrations/backend/docker-model-runner/
+
+### Frontend
+- OpenWebUI: https://thushan.github.io/olla/integrations/frontend/openwebui/
+- OpenWebUI (OpenAI): https://thushan.github.io/olla/integrations/frontend/openwebui-openai/
+- Claude Code: https://thushan.github.io/olla/integrations/frontend/claude-code/
+- OpenCode: https://thushan.github.io/olla/integrations/frontend/opencode/
+- Crush CLI: https://thushan.github.io/olla/integrations/frontend/crush-cli/
+
+### API Translation
+- Anthropic: https://thushan.github.io/olla/integrations/api-translation/anthropic/
+
+## API Reference
+- Overview: https://thushan.github.io/olla/api-reference/overview/
+- System Endpoints: https://thushan.github.io/olla/api-reference/system/
+- Models API: https://thushan.github.io/olla/api-reference/models/
+
+## Compare
+- Overview: https://thushan.github.io/olla/compare/overview/
+- Integration Patterns: https://thushan.github.io/olla/compare/integration-patterns/
+- vs GPUStack: https://thushan.github.io/olla/compare/gpustack/
+- vs LiteLLM: https://thushan.github.io/olla/compare/litellm/
+- vs LocalAI: https://thushan.github.io/olla/compare/localai/
+
+## Development
+- Overview: https://thushan.github.io/olla/development/overview/
+- Setup: https://thushan.github.io/olla/development/setup/
+- Architecture: https://thushan.github.io/olla/development/architecture/
+- Patterns: https://thushan.github.io/olla/development/patterns/
+- Circuit Breaker: https://thushan.github.io/olla/development/circuit-breaker/
+- Contributing: https://thushan.github.io/olla/development/contributing/
+- Testing: https://thushan.github.io/olla/development/testing/
+- Benchmarking: https://thushan.github.io/olla/development/benchmarking/
+- Anthropic Inspector: https://thushan.github.io/olla/notes/anthropic-inspector/
+
+## GitHub
+- Repository: https://github.com/thushan/olla
+- Releases: https://github.com/thushan/olla/releases
+- Issues: https://github.com/thushan/olla/issues
diff --git a/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/LICENSE b/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/LICENSE
new file mode 100644
index 0000000..d885118
--- /dev/null
+++ b/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/LICENSE
@@ -0,0 +1,201 @@
+
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to the Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by the Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding any notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. Please do not remove or change
+ the license header comment from a contributed file except when
+ necessary.
+
+ Copyright 2026 mukul975
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
diff --git a/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/SKILL.md b/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/SKILL.md
new file mode 100644
index 0000000..d3d1730
--- /dev/null
+++ b/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/SKILL.md
@@ -0,0 +1,242 @@
+---
+name: acquiring-disk-image-with-dd-and-dcfldd
+description: Create forensically sound bit-for-bit disk images using dd and dcfldd while preserving evidence integrity through
+ hash verification.
+domain: cybersecurity
+subdomain: digital-forensics
+tags:
+- forensics
+- disk-imaging
+- evidence-acquisition
+- dd
+- dcfldd
+- hash-verification
+version: '1.0'
+author: mahipal
+license: Apache-2.0
+nist_csf:
+- RS.AN-01
+- RS.AN-03
+- DE.AE-02
+- RS.MA-01
+---
+
+# Acquiring Disk Image with dd and dcfldd
+
+## When to Use
+- When you need to create a forensic copy of a suspect drive for investigation
+- During incident response when preserving volatile disk evidence before analysis
+- When law enforcement or legal proceedings require a verified bit-for-bit copy
+- Before performing any destructive analysis on a storage device
+- When acquiring images from physical drives, USB devices, or memory cards
+
+## Prerequisites
+- Linux-based forensic workstation (SIFT, Kali, or any Linux distro)
+- `dd` (pre-installed on all Linux systems) or `dcfldd` (enhanced forensic version)
+- Write-blocker hardware or software write-blocking configured
+- Destination drive with sufficient storage (larger than source)
+- Root/sudo privileges on the forensic workstation
+- SHA-256 or MD5 hashing utilities (`sha256sum`, `md5sum`)
+
+## Workflow
+
+### Step 1: Identify the Target Device and Enable Write Protection
+
+```bash
+# List all connected block devices to identify the target
+lsblk -o NAME,SIZE,TYPE,MOUNTPOINT,MODEL
+
+# Verify the device details
+fdisk -l /dev/sdb
+
+# Enable software write-blocking (if no hardware blocker)
+blockdev --setro /dev/sdb
+
+# Verify read-only status
+blockdev --getro /dev/sdb
+# Output: 1 (means read-only is enabled)
+
+# Alternatively, use udev rules for persistent write-blocking
+echo 'SUBSYSTEM=="block", ATTRS{serial}=="WD-WCAV5H861234", ATTR{ro}="1"' > /etc/udev/rules.d/99-writeblock.rules
+udevadm control --reload-rules
+```
+
+### Step 2: Prepare the Destination and Document the Source
+
+```bash
+# Create case directory structure
+mkdir -p /cases/case-2024-001/{images,hashes,logs,notes}
+
+# Document source drive information
+hdparm -I /dev/sdb > /cases/case-2024-001/notes/source_drive_info.txt
+
+# Record the serial number and model
+smartctl -i /dev/sdb >> /cases/case-2024-001/notes/source_drive_info.txt
+
+# Pre-hash the source device
+sha256sum /dev/sdb | tee /cases/case-2024-001/hashes/source_hash_before.txt
+```
+
+### Step 3: Acquire the Image Using dd
+
+```bash
+# Basic dd acquisition with progress and error handling
+dd if=/dev/sdb of=/cases/case-2024-001/images/evidence.dd \
+ bs=4096 \
+ conv=noerror,sync \
+ status=progress 2>&1 | tee /cases/case-2024-001/logs/dd_acquisition.log
+
+# For compressed images to save space
+dd if=/dev/sdb bs=4096 conv=noerror,sync status=progress | \
+ gzip -c > /cases/case-2024-001/images/evidence.dd.gz
+
+# Using dd with a specific count for partial acquisition
+dd if=/dev/sdb of=/cases/case-2024-001/images/first_1gb.dd \
+ bs=1M count=1024 status=progress
+```
+
+### Step 4: Acquire Using dcfldd (Preferred Forensic Method)
+
+```bash
+# Install dcfldd if not present
+apt-get install dcfldd
+
+# Acquire image with built-in hashing and split output
+dcfldd if=/dev/sdb \
+ of=/cases/case-2024-001/images/evidence.dd \
+ hash=sha256,md5 \
+ hashwindow=1G \
+ hashlog=/cases/case-2024-001/hashes/acquisition_hashes.txt \
+ bs=4096 \
+ conv=noerror,sync \
+ errlog=/cases/case-2024-001/logs/dcfldd_errors.log
+
+# Split large images into manageable segments
+dcfldd if=/dev/sdb \
+ of=/cases/case-2024-001/images/evidence.dd \
+ hash=sha256 \
+ hashlog=/cases/case-2024-001/hashes/split_hashes.txt \
+ bs=4096 \
+ split=2G \
+ splitformat=aa
+
+# Acquire with verification pass
+dcfldd if=/dev/sdb \
+ of=/cases/case-2024-001/images/evidence.dd \
+ hash=sha256 \
+ hashlog=/cases/case-2024-001/hashes/verification.txt \
+ vf=/cases/case-2024-001/images/evidence.dd \
+ verifylog=/cases/case-2024-001/logs/verify.log
+```
+
+### Step 5: Verify Image Integrity
+
+```bash
+# Hash the acquired image
+sha256sum /cases/case-2024-001/images/evidence.dd | \
+ tee /cases/case-2024-001/hashes/image_hash.txt
+
+# Compare source and image hashes
+diff <(sha256sum /dev/sdb | awk '{print $1}') \
+ <(sha256sum /cases/case-2024-001/images/evidence.dd | awk '{print $1}')
+
+# If using split images, verify each segment
+sha256sum /cases/case-2024-001/images/evidence.dd.* | \
+ tee /cases/case-2024-001/hashes/split_image_hashes.txt
+
+# Re-hash source to confirm no changes occurred
+sha256sum /dev/sdb | tee /cases/case-2024-001/hashes/source_hash_after.txt
+diff /cases/case-2024-001/hashes/source_hash_before.txt \
+ /cases/case-2024-001/hashes/source_hash_after.txt
+```
+
+### Step 6: Document the Acquisition Process
+
+```bash
+# Generate acquisition report
+cat << 'EOF' > /cases/case-2024-001/notes/acquisition_report.txt
+DISK IMAGE ACQUISITION REPORT
+==============================
+Case Number: 2024-001
+Date/Time: $(date -u +"%Y-%m-%d %H:%M:%S UTC")
+Examiner: [Name]
+
+Source Device: /dev/sdb
+Model: [from hdparm output]
+Serial: [from hdparm output]
+Size: [from fdisk output]
+
+Acquisition Tool: dcfldd v1.9.1
+Block Size: 4096
+Write Blocker: [Hardware/Software model]
+
+Image File: evidence.dd
+Image Hash (SHA-256): [from hash file]
+Source Hash (SHA-256): [from hash file]
+Hash Match: YES/NO
+
+Errors During Acquisition: [from error log]
+EOF
+
+# Compress logs for archival
+tar -czf /cases/case-2024-001/acquisition_package.tar.gz \
+ /cases/case-2024-001/hashes/ \
+ /cases/case-2024-001/logs/ \
+ /cases/case-2024-001/notes/
+```
+
+## Key Concepts
+
+| Concept | Description |
+|---------|-------------|
+| Bit-for-bit copy | Exact replica of source including unallocated space and slack space |
+| Write blocker | Hardware or software mechanism preventing writes to evidence media |
+| Hash verification | Cryptographic hash comparing source and image to prove integrity |
+| Block size (bs) | Transfer chunk size affecting speed; 4096 or 64K typical for forensics |
+| conv=noerror,sync | Continue on read errors and pad with zeros to maintain offset alignment |
+| Chain of custody | Documented trail proving evidence has not been tampered with |
+| Split imaging | Breaking large images into smaller files for storage and transport |
+| Raw/dd format | Bit-for-bit image format without metadata container overhead |
+
+## Tools & Systems
+
+| Tool | Purpose |
+|------|---------|
+| dd | Standard Unix disk duplication utility for raw imaging |
+| dcfldd | DoD Computer Forensics Laboratory enhanced version of dd with hashing |
+| dc3dd | Another forensic dd variant from the DoD Cyber Crime Center |
+| sha256sum | SHA-256 hash calculation for integrity verification |
+| blockdev | Linux command to set block device read-only mode |
+| hdparm | Drive identification and parameter reporting |
+| smartctl | S.M.A.R.T. data retrieval for drive health and identification |
+| lsblk | Block device enumeration and identification |
+
+## Common Scenarios
+
+**Scenario 1: Acquiring a Suspect Laptop Hard Drive**
+Connect the drive via a Tableau T35u hardware write-blocker, identify as `/dev/sdb`, use dcfldd with SHA-256 hashing, split into 4GB segments for DVD archival, verify hashes match, document in case notes.
+
+**Scenario 2: Imaging a USB Flash Drive from a Compromised Workstation**
+Use software write-blocking with `blockdev --setro`, acquire with dcfldd including MD5 and SHA-256 dual hashing, image is small enough for single file, verify and store on encrypted case drive.
+
+**Scenario 3: Remote Acquisition Over Network**
+Use dd piped through netcat or ssh for remote acquisition: `ssh root@remote "dd if=/dev/sda bs=4096" | dd of=remote_image.dd bs=4096`, hash both ends independently to verify transfer integrity.
+
+**Scenario 4: Acquiring from a Failing Drive**
+Use `ddrescue` first to recover readable sectors, then use dd with `conv=noerror,sync` to fill gaps with zeros, document which sectors were unreadable in the error log.
+
+## Output Format
+
+```
+Acquisition Summary:
+ Source: /dev/sdb (500GB Western Digital WD5000AAKX)
+ Destination: /cases/case-2024-001/images/evidence.dd
+ Tool: dcfldd 1.9.1
+ Block Size: 4096 bytes
+ Duration: 2h 15m 32s
+ Bytes Copied: 500,107,862,016
+ Errors: 0 bad sectors
+ Source SHA-256: a3f2b8c9d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1
+ Image SHA-256: a3f2b8c9d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1
+ Verification: PASSED - Hashes match
+```
diff --git a/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/references/api-reference.md b/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/references/api-reference.md
new file mode 100644
index 0000000..a7a24b9
--- /dev/null
+++ b/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/references/api-reference.md
@@ -0,0 +1,99 @@
+# API Reference: dd and dcfldd Disk Imaging
+
+## dd - Standard Unix Disk Duplication
+
+### Basic Syntax
+```bash
+dd if= of= [options]
+```
+
+### Key Options
+| Flag | Description | Example |
+|------|-------------|---------|
+| `if=` | Input file (source device) | `if=/dev/sdb` |
+| `of=` | Output file (destination image) | `of=evidence.dd` |
+| `bs=` | Block size for read/write | `bs=4096` (forensic standard) |
+| `count=` | Number of blocks to copy | `count=1024` |
+| `skip=` | Skip N blocks from input start | `skip=2048` |
+| `conv=` | Conversion options | `conv=noerror,sync` |
+| `status=` | Transfer statistics level | `status=progress` |
+
+### conv= Values
+- `noerror` - Continue on read errors (do not abort)
+- `sync` - Pad input blocks with zeros on error (preserves offset alignment)
+- `notrunc` - Do not truncate output file
+
+### Output Format
+```
+500107862016 bytes (500 GB, 466 GiB) copied, 8132.45 s, 61.5 MB/s
+976773168+0 records in
+976773168+0 records out
+```
+
+## dcfldd - DoD Forensic dd
+
+### Basic Syntax
+```bash
+dcfldd if= of= [options]
+```
+
+### Extended Options
+| Flag | Description | Example |
+|------|-------------|---------|
+| `hash=` | Hash algorithm(s) | `hash=sha256,md5` |
+| `hashlog=` | File for hash output | `hashlog=hashes.txt` |
+| `hashwindow=` | Hash every N bytes | `hashwindow=1G` |
+| `hashconv=` | Hash before or after conversion | `hashconv=after` |
+| `errlog=` | Error log file | `errlog=errors.log` |
+| `split=` | Split output into chunks | `split=2G` |
+| `splitformat=` | Suffix format for split files | `splitformat=aa` |
+| `vf=` | Verification file | `vf=evidence.dd` |
+| `verifylog=` | Verification result log | `verifylog=verify.log` |
+
+### Output Format
+```
+Total (sha256): a3f2b8c9d4e5f6a7b8c9d0e1f2a3b4c5...
+1024+0 records in
+1024+0 records out
+```
+
+## sha256sum - Hash Verification
+
+### Syntax
+```bash
+sha256sum
+sha256sum -c
+```
+
+### Output Format
+```
+a3f2b8c9d4e5f6... /dev/sdb
+a3f2b8c9d4e5f6... evidence.dd
+```
+
+## blockdev - Write Protection
+
+### Syntax
+```bash
+blockdev --setro # Set read-only
+blockdev --setrw # Set read-write
+blockdev --getro # Check: 1=RO, 0=RW
+blockdev --getsize64 # Size in bytes
+```
+
+## lsblk - Block Device Enumeration
+
+### Syntax
+```bash
+lsblk -o NAME,SIZE,TYPE,MOUNTPOINT,MODEL,SERIAL,RO
+lsblk -J # JSON output
+lsblk -p # Full device paths
+```
+
+## hdparm - Drive Identification
+
+### Syntax
+```bash
+hdparm -I # Detailed drive info
+hdparm -i # Summary identification
+```
diff --git a/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/scripts/agent.py b/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/scripts/agent.py
new file mode 100644
index 0000000..2b3d5ac
--- /dev/null
+++ b/personas/_shared/skills/acquiring-disk-image-with-dd-and-dcfldd/scripts/agent.py
@@ -0,0 +1,181 @@
+#!/usr/bin/env python3
+"""Forensic disk image acquisition agent using dd and dcfldd with hash verification."""
+
+import shlex
+import subprocess
+import hashlib
+import os
+import datetime
+import json
+
+
+def run_cmd(cmd, capture=True):
+ """Execute a command and return output."""
+ if isinstance(cmd, str):
+ cmd = shlex.split(cmd)
+ result = subprocess.run(cmd, capture_output=capture, text=True, timeout=120)
+ return result.stdout.strip(), result.stderr.strip(), result.returncode
+
+
+def list_block_devices():
+ """Enumerate connected block devices."""
+ stdout, _, rc = run_cmd("lsblk -J -o NAME,SIZE,TYPE,MOUNTPOINT,MODEL,SERIAL,RO")
+ if rc == 0 and stdout:
+ return json.loads(stdout)
+ return {"blockdevices": []}
+
+
+def check_write_protection(device):
+ """Verify a device is set to read-only mode."""
+ stdout, _, rc = run_cmd(f"blockdev --getro {device}")
+ if rc == 0:
+ return stdout.strip() == "1"
+ return False
+
+
+def enable_write_protection(device):
+ """Enable software write-blocking on the target device."""
+ _, _, rc = run_cmd(f"blockdev --setro {device}")
+ if rc != 0:
+ print(f"[ERROR] Failed to set {device} read-only. Run as root.")
+ return False
+ if check_write_protection(device):
+ print(f"[OK] Write protection enabled on {device}")
+ return True
+ print(f"[ERROR] Write protection verification failed for {device}")
+ return False
+
+
+def compute_hash(path, algorithm="sha256", block_size=65536):
+ """Compute the SHA-256 or MD5 hash of a file or device."""
+ h = hashlib.new(algorithm)
+ try:
+ with open(path, "rb") as f:
+ while True:
+ block = f.read(block_size)
+ if not block:
+ break
+ h.update(block)
+ except PermissionError:
+ print(f"[ERROR] Permission denied reading {path}. Run as root.")
+ return None
+ except FileNotFoundError:
+ print(f"[ERROR] Path not found: {path}")
+ return None
+ return h.hexdigest()
+
+
+def acquire_with_dd(source, destination, block_size=4096, log_file=None):
+ """Acquire a forensic image using dd with error handling."""
+ dd_cmd = [
+ "dd", f"if={source}", f"of={destination}",
+ f"bs={block_size}", "conv=noerror,sync", "status=progress"
+ ]
+ print(f"[*] Starting dd acquisition: {source} -> {destination}")
+ print(f"[*] Block size: {block_size}")
+ start = datetime.datetime.utcnow()
+ if log_file:
+ dd_proc = subprocess.run(dd_cmd, capture_output=True, text=True, timeout=120)
+ combined = (dd_proc.stdout or "") + (dd_proc.stderr or "")
+ with open(log_file, "w") as lf:
+ lf.write(combined)
+ rc = dd_proc.returncode
+ else:
+ result = subprocess.run(dd_cmd, text=True, timeout=120)
+ rc = result.returncode
+ elapsed = (datetime.datetime.utcnow() - start).total_seconds()
+ print(f"[*] Acquisition completed in {elapsed:.1f} seconds (rc={rc})")
+ return rc == 0
+
+
+def acquire_with_dcfldd(source, destination, hash_alg="sha256", hash_log=None,
+ error_log=None, block_size=4096, split_size=None):
+ """Acquire a forensic image using dcfldd with built-in hashing."""
+ cmd = [
+ "dcfldd", f"if={source}", f"of={destination}",
+ f"bs={block_size}", "conv=noerror,sync",
+ f"hash={hash_alg}", "hashwindow=1G",
+ ]
+ if hash_log:
+ cmd.append(f"hashlog={hash_log}")
+ if error_log:
+ cmd.append(f"errlog={error_log}")
+ if split_size:
+ cmd.extend([f"split={split_size}", "splitformat=aa"])
+ print(f"[*] Starting dcfldd acquisition: {source} -> {destination}")
+ start = datetime.datetime.utcnow()
+ result = subprocess.run(cmd, text=True, timeout=120)
+ rc = result.returncode
+ elapsed = (datetime.datetime.utcnow() - start).total_seconds()
+ print(f"[*] dcfldd completed in {elapsed:.1f} seconds (rc={rc})")
+ return rc == 0
+
+
+def verify_image(source, image_path, algorithm="sha256"):
+ """Verify image integrity by comparing hashes of source and acquired image."""
+ print(f"[*] Computing {algorithm} hash of source: {source}")
+ source_hash = compute_hash(source, algorithm)
+ print(f" Source hash: {source_hash}")
+ print(f"[*] Computing {algorithm} hash of image: {image_path}")
+ image_hash = compute_hash(image_path, algorithm)
+ print(f" Image hash: {image_hash}")
+ if source_hash and image_hash:
+ match = source_hash == image_hash
+ status = "PASSED" if match else "FAILED"
+ print(f"[{'OK' if match else 'FAIL'}] Verification: {status}")
+ return match, source_hash, image_hash
+ return False, source_hash, image_hash
+
+
+def generate_report(case_dir, source_device, image_path, tool_used,
+ source_hash, image_hash, verified, elapsed_seconds=0):
+ """Generate a forensic acquisition report."""
+ report = {
+ "report_type": "Disk Image Acquisition",
+ "timestamp": datetime.datetime.utcnow().isoformat() + "Z",
+ "case_directory": case_dir,
+ "source_device": source_device,
+ "image_file": image_path,
+ "acquisition_tool": tool_used,
+ "block_size": 4096,
+ "source_hash_sha256": source_hash,
+ "image_hash_sha256": image_hash,
+ "hash_verified": verified,
+ "duration_seconds": elapsed_seconds,
+ }
+ report_path = os.path.join(case_dir, "acquisition_report.json")
+ with open(report_path, "w") as f:
+ json.dump(report, f, indent=2)
+ print(f"[*] Report saved to {report_path}")
+ return report
+
+
+if __name__ == "__main__":
+ print("=" * 60)
+ print("Forensic Disk Image Acquisition Agent")
+ print("Tools: dd / dcfldd with SHA-256 verification")
+ print("=" * 60)
+
+ # Demo: list block devices
+ print("\n[*] Enumerating block devices...")
+ devices = list_block_devices()
+ for dev in devices.get("blockdevices", []):
+ name = dev.get("name", "?")
+ size = dev.get("size", "?")
+ dtype = dev.get("type", "?")
+ model = dev.get("model", "N/A")
+ ro = "RO" if dev.get("ro") else "RW"
+ print(f" /dev/{name} {size} {dtype} {model} [{ro}]")
+
+ # Demo workflow (dry run)
+ demo_source = "/dev/sdb"
+ demo_case = "/cases/demo-case/images"
+ demo_image = os.path.join(demo_case, "evidence.dd")
+
+ print(f"\n[DEMO] Acquisition workflow for {demo_source}:")
+ print(f" 1. Enable write protection: blockdev --setro {demo_source}")
+ print(f" 2. Acquire with dcfldd: dcfldd if={demo_source} of={demo_image} "
+ f"hash=sha256 hashwindow=1G bs=4096 conv=noerror,sync")
+ print(f" 3. Verify: compare SHA-256 of {demo_source} and {demo_image}")
+ print(f" 4. Generate acquisition report with chain-of-custody metadata")
+ print("\n[*] Agent ready. Provide a source device and case directory to begin.")
diff --git a/personas/_shared/skills/analyzing-active-directory-acl-abuse/LICENSE b/personas/_shared/skills/analyzing-active-directory-acl-abuse/LICENSE
new file mode 100644
index 0000000..d885118
--- /dev/null
+++ b/personas/_shared/skills/analyzing-active-directory-acl-abuse/LICENSE
@@ -0,0 +1,201 @@
+
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to the Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by the Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding any notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. Please do not remove or change
+ the license header comment from a contributed file except when
+ necessary.
+
+ Copyright 2026 mukul975
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
diff --git a/personas/_shared/skills/analyzing-active-directory-acl-abuse/SKILL.md b/personas/_shared/skills/analyzing-active-directory-acl-abuse/SKILL.md
new file mode 100644
index 0000000..8deab1e
--- /dev/null
+++ b/personas/_shared/skills/analyzing-active-directory-acl-abuse/SKILL.md
@@ -0,0 +1,84 @@
+---
+name: analyzing-active-directory-acl-abuse
+description: Detect dangerous ACL misconfigurations in Active Directory using ldap3 to identify GenericAll, WriteDACL, and
+ WriteOwner abuse paths
+domain: cybersecurity
+subdomain: identity-security
+tags:
+- active-directory
+- acl-abuse
+- ldap
+- privilege-escalation
+version: '1.0'
+author: mahipal
+license: Apache-2.0
+nist_csf:
+- PR.AA-01
+- PR.AA-05
+- PR.AA-06
+---
+
+
+# Analyzing Active Directory ACL Abuse
+
+## Overview
+
+Active Directory Access Control Lists (ACLs) define permissions on AD objects through Discretionary Access Control Lists (DACLs) containing Access Control Entries (ACEs). Misconfigured ACEs can grant non-privileged users dangerous permissions such as GenericAll (full control), WriteDACL (modify permissions), WriteOwner (take ownership), and GenericWrite (modify attributes) on sensitive objects like Domain Admins groups, domain controllers, or GPOs.
+
+This skill uses the ldap3 Python library to connect to a Domain Controller, query objects with their nTSecurityDescriptor attribute, parse the binary security descriptor into SDDL (Security Descriptor Definition Language) format, and identify ACEs that grant dangerous permissions to non-administrative principals. These misconfigurations are the basis for ACL-based attack paths discovered by tools like BloodHound.
+
+
+## When to Use
+
+- When investigating security incidents that require analyzing active directory acl abuse
+- When building detection rules or threat hunting queries for this domain
+- When SOC analysts need structured procedures for this analysis type
+- When validating security monitoring coverage for related attack techniques
+
+## Prerequisites
+
+- Python 3.9 or later with ldap3 library (`pip install ldap3`)
+- Domain user credentials with read access to AD objects
+- Network connectivity to Domain Controller on port 389 (LDAP) or 636 (LDAPS)
+- Understanding of Active Directory security model and SDDL format
+
+## Steps
+
+1. **Connect to Domain Controller**: Establish an LDAP connection using ldap3 with NTLM or simple authentication. Use LDAPS (port 636) for encrypted connections in production.
+
+2. **Query target objects**: Search the target OU or entire domain for objects including users, groups, computers, and OUs. Request the `nTSecurityDescriptor`, `distinguishedName`, `objectClass`, and `sAMAccountName` attributes.
+
+3. **Parse security descriptors**: Convert the binary nTSecurityDescriptor into its SDDL string representation. Parse each ACE in the DACL to extract the trustee SID, access mask, and ACE type (allow/deny).
+
+4. **Resolve SIDs to principals**: Map security identifiers (SIDs) to human-readable account names using LDAP lookups against the domain. Identify well-known SIDs for built-in groups.
+
+5. **Check for dangerous permissions**: Compare each ACE's access mask against dangerous permission bitmasks: GenericAll (0x10000000), WriteDACL (0x00040000), WriteOwner (0x00080000), GenericWrite (0x40000000), and WriteProperty for specific extended rights.
+
+6. **Filter non-admin trustees**: Exclude expected administrative trustees (Domain Admins, Enterprise Admins, SYSTEM, Administrators) and flag ACEs where non-privileged users or groups hold dangerous permissions.
+
+7. **Map attack paths**: For each finding, document the potential attack chain (e.g., GenericAll on user allows password reset, WriteDACL on group allows adding self to group).
+
+8. **Generate remediation report**: Output a JSON report with all dangerous ACEs, affected objects, non-admin trustees, and recommended remediation steps.
+
+## Expected Output
+
+```json
+{
+ "domain": "corp.example.com",
+ "objects_scanned": 1247,
+ "dangerous_aces_found": 8,
+ "findings": [
+ {
+ "severity": "critical",
+ "target_object": "CN=Domain Admins,CN=Users,DC=corp,DC=example,DC=com",
+ "target_type": "group",
+ "trustee": "CORP\\helpdesk-team",
+ "permission": "GenericAll",
+ "access_mask": "0x10000000",
+ "ace_type": "ACCESS_ALLOWED",
+ "attack_path": "GenericAll on Domain Admins group allows adding arbitrary members",
+ "remediation": "Remove GenericAll ACE for helpdesk-team on Domain Admins"
+ }
+ ]
+}
+```
diff --git a/personas/_shared/skills/analyzing-active-directory-acl-abuse/references/api-reference.md b/personas/_shared/skills/analyzing-active-directory-acl-abuse/references/api-reference.md
new file mode 100644
index 0000000..b2c5500
--- /dev/null
+++ b/personas/_shared/skills/analyzing-active-directory-acl-abuse/references/api-reference.md
@@ -0,0 +1,94 @@
+# Active Directory ACL Abuse API Reference
+
+## ldap3 Python Connection
+
+```python
+from ldap3 import Server, Connection, ALL, NTLM, SUBTREE
+
+server = Server("192.168.1.10", get_info=ALL, use_ssl=False)
+conn = Connection(server, user="DOMAIN\\user", password="pass",
+ authentication=NTLM, auto_bind=True)
+
+# Search with nTSecurityDescriptor
+conn.search(
+ "DC=corp,DC=example,DC=com",
+ "(objectClass=group)",
+ search_scope=SUBTREE,
+ attributes=["distinguishedName", "sAMAccountName",
+ "objectClass", "nTSecurityDescriptor"],
+)
+```
+
+## SDDL ACE Format
+
+```
+ACE String: (ace_type;ace_flags;rights;object_guid;inherit_guid;trustee_sid)
+Example: (A;;GA;;;S-1-5-21-xxx-512)
+```
+
+| Component | Description |
+|-----------|-------------|
+| `A` | Access Allowed |
+| `D` | Access Denied |
+| `OA` | Object Access Allowed |
+| `GA` | Generic All |
+| `GW` | Generic Write |
+| `WD` | Write DACL |
+| `WO` | Write Owner |
+
+## Dangerous Permission Bitmasks
+
+| Permission | Hex Mask | Risk |
+|-----------|----------|------|
+| GenericAll | `0x10000000` | Full control over object |
+| GenericWrite | `0x40000000` | Modify all writable attributes |
+| WriteDACL | `0x00040000` | Modify object permissions |
+| WriteOwner | `0x00080000` | Take object ownership |
+| WriteProperty | `0x00000020` | Write specific properties |
+| ExtendedRight | `0x00000100` | Extended rights (password reset, etc.) |
+| Self | `0x00000008` | Self-membership modification |
+| Delete | `0x00010000` | Delete the object |
+
+## BloodHound Cypher Queries for ACL Paths
+
+```cypher
+-- Find all users with GenericAll on Domain Admins
+MATCH p=(n:User)-[r:GenericAll]->(g:Group {name:"DOMAIN ADMINS@CORP.COM"})
+RETURN p
+
+-- Find WriteDACL paths from non-admins to high-value targets
+MATCH (n:User {admincount:false})
+MATCH p=allShortestPaths((n)-[r:WriteDacl|WriteOwner|GenericAll*1..]->(m:Group))
+WHERE m.highvalue = true
+RETURN p
+
+-- Find GenericWrite on computers for RBCD attacks
+MATCH p=(n:User)-[r:GenericWrite]->(c:Computer)
+WHERE NOT n.admincount
+RETURN n.name, c.name
+
+-- Enumerate all outbound ACL edges for a principal
+MATCH p=(n {name:"HELPDESK@CORP.COM"})-[r:GenericAll|GenericWrite|WriteDacl|WriteOwner|Owns]->(m)
+RETURN type(r), m.name, labels(m)
+
+-- Find shortest ACL abuse path to Domain Admin
+MATCH (n:User {name:"JSMITH@CORP.COM"})
+MATCH (da:Group {name:"DOMAIN ADMINS@CORP.COM"})
+MATCH p=shortestPath((n)-[r:MemberOf|GenericAll|GenericWrite|WriteDacl|WriteOwner|Owns|ForceChangePassword*1..]->(da))
+RETURN p
+```
+
+## PowerView Commands for ACL Enumeration
+
+```powershell
+# Get ACL for Domain Admins group
+Get-DomainObjectAcl -Identity "Domain Admins" -ResolveGUIDs
+
+# Find interesting ACEs for non-admin users
+Find-InterestingDomainAcl -ResolveGUIDs | Where-Object {
+ $_.ActiveDirectoryRights -match "GenericAll|WriteDacl|WriteOwner"
+}
+
+# Get ACL for specific OU
+Get-DomainObjectAcl -SearchBase "OU=Servers,DC=corp,DC=com" -ResolveGUIDs
+```
diff --git a/personas/_shared/skills/analyzing-active-directory-acl-abuse/scripts/agent.py b/personas/_shared/skills/analyzing-active-directory-acl-abuse/scripts/agent.py
new file mode 100644
index 0000000..e4c294d
--- /dev/null
+++ b/personas/_shared/skills/analyzing-active-directory-acl-abuse/scripts/agent.py
@@ -0,0 +1,258 @@
+#!/usr/bin/env python3
+"""Active Directory ACL abuse detection using ldap3 to find dangerous permissions."""
+
+import argparse
+import json
+import struct
+
+from ldap3 import Server, Connection, ALL, NTLM, SUBTREE
+
+
+DANGEROUS_MASKS = {
+ "GenericAll": 0x10000000,
+ "GenericWrite": 0x40000000,
+ "WriteDACL": 0x00040000,
+ "WriteOwner": 0x00080000,
+ "WriteProperty": 0x00000020,
+ "Self": 0x00000008,
+ "ExtendedRight": 0x00000100,
+ "DeleteChild": 0x00000002,
+ "Delete": 0x00010000,
+}
+
+ADMIN_SIDS = {
+ "S-1-5-18",
+ "S-1-5-32-544",
+ "S-1-5-9",
+}
+
+ADMIN_RID_SUFFIXES = {
+ "-500",
+ "-512",
+ "-516",
+ "-518",
+ "-519",
+ "-498",
+}
+
+ATTACK_PATHS = {
+ "GenericAll": {
+ "user": "Full control allows password reset, Kerberoasting via SPN, or shadow credential attack",
+ "group": "Full control allows adding arbitrary members to the group",
+ "computer": "Full control allows resource-based constrained delegation attack",
+ "organizationalUnit": "Full control allows linking malicious GPO or moving objects",
+ },
+ "WriteDACL": {
+ "user": "Can modify DACL to grant self GenericAll, then reset password",
+ "group": "Can modify DACL to grant self write membership, then add self",
+ "computer": "Can modify DACL to grant self full control on machine account",
+ "organizationalUnit": "Can modify DACL to gain control over OU child objects",
+ },
+ "WriteOwner": {
+ "user": "Can take ownership then modify DACL to escalate privileges",
+ "group": "Can take ownership of group then modify membership",
+ "computer": "Can take ownership then configure delegation abuse",
+ "organizationalUnit": "Can take ownership then control OU policies",
+ },
+ "GenericWrite": {
+ "user": "Can write scriptPath for logon script execution or modify SPN for Kerberoasting",
+ "group": "Can modify group attributes including membership",
+ "computer": "Can write msDS-AllowedToActOnBehalfOfOtherIdentity for RBCD attack",
+ "organizationalUnit": "Can modify OU attributes and link GPO",
+ },
+}
+
+
+def is_admin_sid(sid: str, domain_sid: str) -> bool:
+ if sid in ADMIN_SIDS:
+ return True
+ for suffix in ADMIN_RID_SUFFIXES:
+ if sid == domain_sid + suffix:
+ return True
+ return False
+
+
+def parse_sid(raw: bytes) -> str:
+ if len(raw) < 8:
+ return ""
+ revision = raw[0]
+ sub_auth_count = raw[1]
+ authority = int.from_bytes(raw[2:8], byteorder="big")
+ subs = []
+ for i in range(sub_auth_count):
+ offset = 8 + i * 4
+ if offset + 4 > len(raw):
+ break
+ subs.append(struct.unpack(" list:
+ aces = []
+ if len(descriptor_bytes) < 20:
+ return aces
+ revision = descriptor_bytes[0]
+ control = struct.unpack("= len(descriptor_bytes):
+ return aces
+ dacl = descriptor_bytes[dacl_offset:]
+ if len(dacl) < 8:
+ return aces
+ acl_size = struct.unpack(" len(dacl):
+ break
+ ace_type = dacl[offset]
+ ace_flags = dacl[offset + 1]
+ ace_size = struct.unpack(" len(dacl):
+ break
+ if ace_type in (0x00, 0x05):
+ if offset + 8 <= len(dacl):
+ access_mask = struct.unpack(" str:
+ try:
+ conn.search(base_dn, f"(objectSid={sid})", attributes=["sAMAccountName", "cn"])
+ if conn.entries:
+ entry = conn.entries[0]
+ return str(entry.sAMAccountName) if hasattr(entry, "sAMAccountName") else str(entry.cn)
+ except Exception:
+ pass
+ return sid
+
+
+def get_domain_sid(conn: Connection, base_dn: str) -> str:
+ conn.search(base_dn, "(objectClass=domain)", attributes=["objectSid"])
+ if conn.entries:
+ raw = conn.entries[0].objectSid.raw_values[0]
+ return parse_sid(raw)
+ return ""
+
+
+def analyze_acls(dc_ip: str, domain: str, username: str, password: str,
+ target_ou: str) -> dict:
+ server = Server(dc_ip, get_info=ALL, use_ssl=False)
+ domain_parts = domain.split(".")
+ base_dn = ",".join(f"DC={p}" for p in domain_parts)
+ search_base = target_ou if target_ou else base_dn
+ ntlm_user = f"{domain}\\{username}"
+
+ conn = Connection(server, user=ntlm_user, password=password,
+ authentication=NTLM, auto_bind=True)
+ domain_sid = get_domain_sid(conn, base_dn)
+
+ conn.search(
+ search_base,
+ "(|(objectClass=user)(objectClass=group)(objectClass=computer)(objectClass=organizationalUnit))",
+ search_scope=SUBTREE,
+ attributes=["distinguishedName", "sAMAccountName", "objectClass", "nTSecurityDescriptor"],
+ )
+
+ findings = []
+ objects_scanned = 0
+ sid_cache = {}
+
+ for entry in conn.entries:
+ objects_scanned += 1
+ dn = str(entry.distinguishedName)
+ obj_classes = [str(c) for c in entry.objectClass.values] if hasattr(entry, "objectClass") else []
+ obj_type = "unknown"
+ for oc in obj_classes:
+ if oc.lower() in ("user", "group", "computer", "organizationalunit"):
+ obj_type = oc.lower()
+ break
+
+ if not hasattr(entry, "nTSecurityDescriptor"):
+ continue
+ raw_sd = entry.nTSecurityDescriptor.raw_values
+ if not raw_sd:
+ continue
+ sd_bytes = raw_sd[0]
+ aces = parse_acl(sd_bytes)
+
+ for ace in aces:
+ trustee_sid = ace["trustee_sid"]
+ if is_admin_sid(trustee_sid, domain_sid):
+ continue
+ if trustee_sid not in sid_cache:
+ sid_cache[trustee_sid] = resolve_sid(conn, base_dn, trustee_sid)
+ trustee_name = sid_cache[trustee_sid]
+
+ for perm in ace["permissions"]:
+ if perm in ("Delete", "DeleteChild", "Self", "WriteProperty", "ExtendedRight"):
+ severity = "medium"
+ else:
+ severity = "critical"
+ attack = ATTACK_PATHS.get(perm, {}).get(obj_type,
+ f"{perm} on {obj_type} may allow privilege escalation")
+ findings.append({
+ "severity": severity,
+ "target_object": dn,
+ "target_type": obj_type,
+ "trustee": trustee_name,
+ "trustee_sid": trustee_sid,
+ "permission": perm,
+ "access_mask": ace["access_mask"],
+ "ace_type": ace["ace_type"],
+ "attack_path": attack,
+ "remediation": f"Remove {perm} ACE for {trustee_name} on {dn}",
+ })
+
+ conn.unbind()
+ findings.sort(key=lambda f: 0 if f["severity"] == "critical" else 1)
+ return {
+ "domain": domain,
+ "domain_sid": domain_sid,
+ "search_base": search_base,
+ "objects_scanned": objects_scanned,
+ "dangerous_aces_found": len(findings),
+ "findings": findings,
+ }
+
+
+def main():
+ parser = argparse.ArgumentParser(description="Active Directory ACL Abuse Analyzer")
+ parser.add_argument("--dc-ip", required=True, help="Domain Controller IP address")
+ parser.add_argument("--domain", required=True, help="AD domain name (e.g., corp.example.com)")
+ parser.add_argument("--username", required=True, help="Domain username for LDAP bind")
+ parser.add_argument("--password", required=True, help="Domain user password")
+ parser.add_argument("--target-ou", default=None,
+ help="Target OU distinguished name to scope the search")
+ parser.add_argument("--output", default=None, help="Output JSON file path")
+ args = parser.parse_args()
+
+ result = analyze_acls(args.dc_ip, args.domain, args.username,
+ args.password, args.target_ou)
+ report = json.dumps(result, indent=2)
+ if args.output:
+ with open(args.output, "w") as f:
+ f.write(report)
+ print(report)
+
+
+if __name__ == "__main__":
+ main()
diff --git a/personas/_shared/skills/analyzing-android-malware-with-apktool/LICENSE b/personas/_shared/skills/analyzing-android-malware-with-apktool/LICENSE
new file mode 100644
index 0000000..d885118
--- /dev/null
+++ b/personas/_shared/skills/analyzing-android-malware-with-apktool/LICENSE
@@ -0,0 +1,201 @@
+
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to the Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by the Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding any notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. Please do not remove or change
+ the license header comment from a contributed file except when
+ necessary.
+
+ Copyright 2026 mukul975
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
diff --git a/personas/_shared/skills/analyzing-android-malware-with-apktool/SKILL.md b/personas/_shared/skills/analyzing-android-malware-with-apktool/SKILL.md
new file mode 100644
index 0000000..1bb9a19
--- /dev/null
+++ b/personas/_shared/skills/analyzing-android-malware-with-apktool/SKILL.md
@@ -0,0 +1,61 @@
+---
+name: analyzing-android-malware-with-apktool
+description: Perform static analysis of Android APK malware samples using apktool for decompilation, jadx for Java source
+ recovery, and androguard for permission analysis, manifest inspection, and suspicious API call detection.
+domain: cybersecurity
+subdomain: malware-analysis
+tags:
+- Android
+- APK
+- apktool
+- jadx
+- androguard
+- mobile-malware
+- static-analysis
+- reverse-engineering
+version: '1.0'
+author: mahipal
+license: Apache-2.0
+nist_csf:
+- DE.AE-02
+- RS.AN-03
+- ID.RA-01
+- DE.CM-01
+---
+
+# Analyzing Android Malware with Apktool
+
+## Overview
+
+Android malware distributed as APK files can be statically analyzed to extract permissions, activities, services, broadcast receivers, and suspicious API calls without executing the sample. This skill uses androguard for programmatic APK analysis, identifying dangerous permission combinations, obfuscated code patterns, dynamic code loading, reflection-based API calls, and network communication indicators.
+
+
+## When to Use
+
+- When investigating security incidents that require analyzing android malware with apktool
+- When building detection rules or threat hunting queries for this domain
+- When SOC analysts need structured procedures for this analysis type
+- When validating security monitoring coverage for related attack techniques
+
+## Prerequisites
+
+- Python 3.9+ with `androguard`
+- apktool (for resource decompilation)
+- jadx (for Java source recovery, optional)
+- Isolated analysis environment (VM or sandbox)
+- Sample APK files for analysis
+
+## Steps
+
+1. Parse APK with androguard to extract manifest metadata
+2. Enumerate requested permissions and flag dangerous combinations
+3. List activities, services, receivers, and providers from manifest
+4. Scan for suspicious API calls (reflection, crypto, SMS, telephony)
+5. Detect dynamic code loading patterns (DexClassLoader, Runtime.exec)
+6. Extract hardcoded URLs, IPs, and C2 indicators from strings
+7. Generate risk assessment report with MITRE ATT&CK mobile mappings
+
+## Expected Output
+
+- JSON report with permission analysis, component listing, suspicious API calls, network indicators, and risk score
+- Extracted strings and potential IOCs from the APK
diff --git a/personas/_shared/skills/analyzing-android-malware-with-apktool/references/api-reference.md b/personas/_shared/skills/analyzing-android-malware-with-apktool/references/api-reference.md
new file mode 100644
index 0000000..44d8547
--- /dev/null
+++ b/personas/_shared/skills/analyzing-android-malware-with-apktool/references/api-reference.md
@@ -0,0 +1,69 @@
+# API Reference — Analyzing Android Malware with Apktool
+
+## Libraries Used
+- **androguard**: Python APK/DEX analysis — `AnalyzeAPK()`, permission enumeration, API call scanning
+- **re**: Regex extraction of URLs, IPs, base64 patterns from DEX strings
+- **json**: JSON serialization for analysis reports
+
+## CLI Interface
+```
+python agent.py sample.apk permissions
+python agent.py sample.apk manifest
+python agent.py sample.apk apis
+python agent.py sample.apk strings
+python agent.py sample.apk full
+python agent.py sample.apk # defaults to full analysis
+```
+
+## Core Functions
+
+### `analyze_permissions(apk)` — Permission risk assessment
+Calls `apk.get_permissions()`. Flags 20 dangerous permissions including
+SEND_SMS, READ_CONTACTS, BIND_DEVICE_ADMIN, BIND_ACCESSIBILITY_SERVICE.
+Risk: CRITICAL >= 8 dangerous, HIGH >= 5, MEDIUM >= 2, LOW < 2.
+
+### `analyze_manifest(apk)` — Manifest component extraction
+Calls `apk.get_activities()`, `get_services()`, `get_receivers()`, `get_providers()`.
+Returns package name, version, SDK levels, and all component lists.
+
+### `scan_suspicious_apis(dx)` — Suspicious API call detection
+Searches DEX analysis for 14 patterns including:
+- `Runtime.exec`, `ProcessBuilder.start` — command execution
+- `DexClassLoader.loadClass` — dynamic code loading
+- `Method.invoke`, `Class.forName` — reflection
+- `Cipher.getInstance` — cryptographic operations
+- `SmsManager.sendTextMessage` — SMS abuse
+
+### `extract_strings(dx, apk)` — IOC extraction from DEX strings
+Regex extraction of HTTP/HTTPS URLs, external IP addresses, and base64 strings.
+Filters out private IP ranges (10.x, 192.168.x, 172.16.x, 127.x).
+
+### `detect_obfuscation(apk, dx)` — Obfuscation indicator detection
+Checks for single-letter class names (ProGuard), multi-DEX, native libraries.
+
+### `full_analysis(apk_path)` — Comprehensive malware assessment
+
+## Androguard API
+| Method | Returns |
+|--------|---------|
+| `AnalyzeAPK(path)` | `(APK, list[DEX], Analysis)` tuple |
+| `apk.get_permissions()` | List of Android permissions |
+| `apk.get_activities()` | Activity component names |
+| `apk.get_services()` | Service component names |
+| `apk.get_receivers()` | BroadcastReceiver names |
+| `apk.get_package()` | Package name string |
+| `dx.find_methods(classname, methodname)` | Matching method analysis objects |
+| `dx.get_strings()` | All strings from DEX files |
+| `dx.get_classes()` | All class analysis objects |
+
+## Risk Scoring
+| Factor | Max Points |
+|--------|-----------|
+| Dangerous permissions (8 pts each) | 40 |
+| Suspicious API calls (10 pts each) | 30 |
+| External IPs (5 pts each) | 15 |
+| Obfuscation detected | 15 |
+
+## Dependencies
+- `androguard` >= 3.4.0
+- Isolated analysis environment recommended
diff --git a/personas/_shared/skills/analyzing-android-malware-with-apktool/scripts/agent.py b/personas/_shared/skills/analyzing-android-malware-with-apktool/scripts/agent.py
new file mode 100644
index 0000000..f2daacc
--- /dev/null
+++ b/personas/_shared/skills/analyzing-android-malware-with-apktool/scripts/agent.py
@@ -0,0 +1,228 @@
+#!/usr/bin/env python3
+"""Agent for static analysis of Android APK malware using androguard."""
+
+import json
+import re
+import argparse
+from datetime import datetime
+
+try:
+ from androguard.core.apk import APK
+ from androguard.core.dex import DEX
+ from androguard.misc import AnalyzeAPK
+except ImportError:
+ APK = None
+ AnalyzeAPK = None
+
+DANGEROUS_PERMISSIONS = [
+ "android.permission.SEND_SMS", "android.permission.READ_SMS",
+ "android.permission.RECEIVE_SMS", "android.permission.READ_CONTACTS",
+ "android.permission.READ_CALL_LOG", "android.permission.RECORD_AUDIO",
+ "android.permission.CAMERA", "android.permission.ACCESS_FINE_LOCATION",
+ "android.permission.READ_PHONE_STATE", "android.permission.CALL_PHONE",
+ "android.permission.WRITE_EXTERNAL_STORAGE", "android.permission.READ_EXTERNAL_STORAGE",
+ "android.permission.INSTALL_PACKAGES", "android.permission.REQUEST_INSTALL_PACKAGES",
+ "android.permission.SYSTEM_ALERT_WINDOW", "android.permission.BIND_ACCESSIBILITY_SERVICE",
+ "android.permission.BIND_DEVICE_ADMIN", "android.permission.RECEIVE_BOOT_COMPLETED",
+ "android.permission.WRITE_SETTINGS", "android.permission.CHANGE_WIFI_STATE",
+]
+
+SUSPICIOUS_API_PATTERNS = [
+ r"Ljava/lang/Runtime;->exec",
+ r"Ljava/lang/ProcessBuilder;->start",
+ r"Ldalvik/system/DexClassLoader;->loadClass",
+ r"Ljava/lang/reflect/Method;->invoke",
+ r"Ljava/lang/Class;->forName",
+ r"Ljavax/crypto/Cipher;->getInstance",
+ r"Landroid/telephony/SmsManager;->sendTextMessage",
+ r"Landroid/app/admin/DevicePolicyManager;->lockNow",
+ r"Landroid/content/pm/PackageManager;->setComponentEnabledSetting",
+ r"Ljava/net/HttpURLConnection;->connect",
+ r"Lokhttp3/OkHttpClient;->newCall",
+ r"Landroid/webkit/WebView;->loadUrl",
+ r"Landroid/os/Build;->SERIAL",
+ r"Landroid/provider/Settings\$Secure;->getString",
+]
+
+
+def analyze_permissions(apk):
+ """Analyze requested permissions and flag dangerous ones."""
+ permissions = apk.get_permissions()
+ dangerous = [p for p in permissions if p in DANGEROUS_PERMISSIONS]
+ return {
+ "total_permissions": len(permissions),
+ "permissions": permissions,
+ "dangerous_permissions": dangerous,
+ "dangerous_count": len(dangerous),
+ "permission_risk": "CRITICAL" if len(dangerous) >= 8 else "HIGH" if len(dangerous) >= 5 else "MEDIUM" if len(dangerous) >= 2 else "LOW",
+ }
+
+
+def analyze_manifest(apk):
+ """Extract manifest components: activities, services, receivers, providers."""
+ activities = apk.get_activities()
+ services = apk.get_services()
+ receivers = apk.get_receivers()
+ providers = apk.get_providers()
+ return {
+ "package_name": apk.get_package(),
+ "app_name": apk.get_app_name(),
+ "version_name": apk.get_androidversion_name(),
+ "version_code": apk.get_androidversion_code(),
+ "min_sdk": apk.get_min_sdk_version(),
+ "target_sdk": apk.get_target_sdk_version(),
+ "activities": list(activities),
+ "services": list(services),
+ "receivers": list(receivers),
+ "providers": list(providers),
+ "activity_count": len(activities),
+ "service_count": len(services),
+ "receiver_count": len(receivers),
+ "provider_count": len(providers),
+ }
+
+
+def scan_suspicious_apis(dx):
+ """Scan DEX analysis for suspicious API calls."""
+ findings = []
+ if not dx:
+ return findings
+ for pattern in SUSPICIOUS_API_PATTERNS:
+ class_name = pattern.split(";->")[0] + ";"
+ method_name = pattern.split(";->")[1] if ";->" in pattern else None
+ for method in dx.find_methods(classname=class_name, methodname=method_name):
+ xrefs = list(method.get_xref_from())
+ if xrefs:
+ findings.append({
+ "api": pattern,
+ "callers": len(xrefs),
+ "first_caller_class": str(xrefs[0][0].name) if xrefs else None,
+ })
+ return findings
+
+
+def extract_strings(dx, apk):
+ """Extract suspicious strings: URLs, IPs, base64 patterns."""
+ url_pattern = re.compile(r'https?://[\w\-._~:/?#\[\]@!$&\'()*+,;=]+', re.IGNORECASE)
+ ip_pattern = re.compile(r'\b(?:\d{1,3}\.){3}\d{1,3}\b')
+ b64_pattern = re.compile(r'[A-Za-z0-9+/]{30,}={0,2}')
+
+ urls = set()
+ ips = set()
+ b64_strings = []
+
+ if dx:
+ for s in dx.get_strings():
+ val = str(s)
+ urls.update(url_pattern.findall(val))
+ ips.update(ip_pattern.findall(val))
+ b64_matches = b64_pattern.findall(val)
+ b64_strings.extend(b64_matches[:5])
+
+ private_ips = {"10.", "192.168.", "172.16.", "127.0."}
+ external_ips = [ip for ip in ips if not any(ip.startswith(p) for p in private_ips)]
+
+ return {
+ "urls": sorted(urls)[:30],
+ "external_ips": sorted(external_ips)[:20],
+ "suspicious_base64": b64_strings[:10],
+ "url_count": len(urls),
+ "external_ip_count": len(external_ips),
+ }
+
+
+def detect_obfuscation(apk, dx):
+ """Detect code obfuscation indicators."""
+ indicators = []
+ if dx:
+ short_class_names = 0
+ for cls in dx.get_classes():
+ name = str(cls.name)
+ parts = name.replace("/", ".").split(".")
+ if any(len(p) == 1 and p.isalpha() for p in parts):
+ short_class_names += 1
+ if short_class_names > 10:
+ indicators.append({"type": "single_letter_classes", "count": short_class_names})
+
+ dex_files = [f for f in apk.get_files() if f.endswith(".dex")]
+ if len(dex_files) > 1:
+ indicators.append({"type": "multi_dex", "dex_count": len(dex_files)})
+
+ native_libs = [f for f in apk.get_files() if f.endswith(".so")]
+ if native_libs:
+ indicators.append({"type": "native_libraries", "libs": native_libs[:10]})
+
+ return {
+ "obfuscation_indicators": indicators,
+ "likely_obfuscated": len(indicators) > 0,
+ }
+
+
+def full_analysis(apk_path):
+ """Run comprehensive APK malware analysis."""
+ if not APK or not AnalyzeAPK:
+ return {"error": "androguard not installed: pip install androguard"}
+
+ a, d, dx = AnalyzeAPK(apk_path)
+
+ perm_analysis = analyze_permissions(a)
+ manifest = analyze_manifest(a)
+ suspicious_apis = scan_suspicious_apis(dx)
+ strings = extract_strings(dx, a)
+ obfuscation = detect_obfuscation(a, dx)
+
+ risk_score = 0
+ risk_score += min(perm_analysis["dangerous_count"] * 8, 40)
+ risk_score += min(len(suspicious_apis) * 10, 30)
+ risk_score += min(strings["external_ip_count"] * 5, 15)
+ risk_score += 15 if obfuscation["likely_obfuscated"] else 0
+ risk_score = min(risk_score, 100)
+
+ return {
+ "analysis_type": "Android APK Static Analysis",
+ "timestamp": datetime.utcnow().isoformat(),
+ "file": apk_path,
+ "manifest": manifest,
+ "permissions": perm_analysis,
+ "suspicious_apis": suspicious_apis[:20],
+ "strings": strings,
+ "obfuscation": obfuscation,
+ "risk_score": risk_score,
+ "risk_level": "CRITICAL" if risk_score >= 70 else "HIGH" if risk_score >= 50 else "MEDIUM" if risk_score >= 25 else "LOW",
+ "mitre_techniques": [
+ {"id": "T1418", "name": "Software Discovery"} if manifest["service_count"] > 5 else None,
+ {"id": "T1417", "name": "Input Capture"} if "android.permission.BIND_ACCESSIBILITY_SERVICE" in perm_analysis["permissions"] else None,
+ {"id": "T1582", "name": "SMS Control"} if "android.permission.SEND_SMS" in perm_analysis["permissions"] else None,
+ {"id": "T1404", "name": "Exploitation for Privilege Escalation"} if any("DevicePolicyManager" in a.get("api", "") for a in suspicious_apis) else None,
+ ],
+ }
+
+
+def main():
+ parser = argparse.ArgumentParser(description="Android APK Malware Analysis Agent")
+ parser.add_argument("apk", help="Path to APK file")
+ sub = parser.add_subparsers(dest="command")
+ sub.add_parser("permissions", help="Analyze permissions")
+ sub.add_parser("manifest", help="Extract manifest components")
+ sub.add_parser("apis", help="Scan for suspicious API calls")
+ sub.add_parser("strings", help="Extract URLs, IPs, and encoded strings")
+ sub.add_parser("full", help="Full malware analysis")
+ args = parser.parse_args()
+
+ if args.command == "full" or args.command is None:
+ result = full_analysis(args.apk)
+ else:
+ a, d, dx = AnalyzeAPK(args.apk)
+ if args.command == "permissions":
+ result = analyze_permissions(a)
+ elif args.command == "manifest":
+ result = analyze_manifest(a)
+ elif args.command == "apis":
+ result = scan_suspicious_apis(dx)
+ elif args.command == "strings":
+ result = extract_strings(dx, a)
+ print(json.dumps(result, indent=2, default=str))
+
+
+if __name__ == "__main__":
+ main()
diff --git a/personas/_shared/skills/analyzing-api-gateway-access-logs/LICENSE b/personas/_shared/skills/analyzing-api-gateway-access-logs/LICENSE
new file mode 100644
index 0000000..d885118
--- /dev/null
+++ b/personas/_shared/skills/analyzing-api-gateway-access-logs/LICENSE
@@ -0,0 +1,201 @@
+
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to the Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by the Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding any notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. Please do not remove or change
+ the license header comment from a contributed file except when
+ necessary.
+
+ Copyright 2026 mukul975
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
diff --git a/personas/_shared/skills/analyzing-api-gateway-access-logs/SKILL.md b/personas/_shared/skills/analyzing-api-gateway-access-logs/SKILL.md
new file mode 100644
index 0000000..24c08d0
--- /dev/null
+++ b/personas/_shared/skills/analyzing-api-gateway-access-logs/SKILL.md
@@ -0,0 +1,71 @@
+---
+name: analyzing-api-gateway-access-logs
+description: 'Parses API Gateway access logs (AWS API Gateway, Kong, Nginx) to detect BOLA/IDOR attacks, rate limit bypass,
+ credential scanning, and injection attempts. Uses pandas for statistical analysis of request patterns and anomaly detection.
+ Use when investigating API abuse or building API-specific threat detection rules.
+
+ '
+domain: cybersecurity
+subdomain: security-operations
+tags:
+- analyzing
+- api
+- gateway
+- access
+version: '1.0'
+author: mahipal
+license: Apache-2.0
+nist_csf:
+- DE.CM-01
+- RS.MA-01
+- GV.OV-01
+- DE.AE-02
+---
+
+# Analyzing API Gateway Access Logs
+
+
+## When to Use
+
+- When investigating security incidents that require analyzing api gateway access logs
+- When building detection rules or threat hunting queries for this domain
+- When SOC analysts need structured procedures for this analysis type
+- When validating security monitoring coverage for related attack techniques
+
+## Prerequisites
+
+- Familiarity with security operations concepts and tools
+- Access to a test or lab environment for safe execution
+- Python 3.8+ with required dependencies installed
+- Appropriate authorization for any testing activities
+
+## Instructions
+
+Parse API gateway access logs to identify attack patterns including broken object
+level authorization (BOLA), excessive data exposure, and injection attempts.
+
+```python
+import pandas as pd
+
+df = pd.read_json("api_gateway_logs.json", lines=True)
+# Detect BOLA: same user accessing many different resource IDs
+bola = df.groupby(["user_id", "endpoint"]).agg(
+ unique_ids=("resource_id", "nunique")).reset_index()
+suspicious = bola[bola["unique_ids"] > 50]
+```
+
+Key detection patterns:
+1. BOLA/IDOR: sequential resource ID enumeration
+2. Rate limit bypass via header manipulation
+3. Credential scanning (401 surges from single source)
+4. SQL/NoSQL injection in query parameters
+5. Unusual HTTP methods (DELETE, PATCH) on read-only endpoints
+
+## Examples
+
+```python
+# Detect 401 surges indicating credential scanning
+auth_failures = df[df["status_code"] == 401]
+scanner_ips = auth_failures.groupby("source_ip").size()
+scanners = scanner_ips[scanner_ips > 100]
+```
diff --git a/personas/_shared/skills/analyzing-api-gateway-access-logs/references/api-reference.md b/personas/_shared/skills/analyzing-api-gateway-access-logs/references/api-reference.md
new file mode 100644
index 0000000..54b6239
--- /dev/null
+++ b/personas/_shared/skills/analyzing-api-gateway-access-logs/references/api-reference.md
@@ -0,0 +1,58 @@
+# API Reference: Analyzing API Gateway Access Logs
+
+## AWS API Gateway Log Fields
+
+```json
+{
+ "requestId": "abc-123",
+ "ip": "203.0.113.50",
+ "httpMethod": "GET",
+ "resourcePath": "/api/users/{id}",
+ "status": 200,
+ "requestTime": "2025-03-15T14:00:00Z",
+ "responseLength": 1024
+}
+```
+
+## Pandas Log Analysis
+
+```python
+import pandas as pd
+
+df = pd.read_json("access_logs.json", lines=True)
+
+# BOLA detection
+df.groupby("user_id")["resource_id"].nunique()
+
+# Auth failure surge
+df[df["status_code"] == 401].groupby("source_ip").size()
+
+# Request velocity
+df.set_index("timestamp").resample("1min").size()
+```
+
+## OWASP API Top 10 Patterns
+
+| Risk | Detection Pattern |
+|------|-------------------|
+| BOLA (API1) | User accessing > 50 unique resource IDs |
+| Broken Auth (API2) | > 100 401/403 from single IP |
+| Excessive Data (API3) | Response size > 10x average |
+| Rate Limit (API4) | > 100 req/min from single IP |
+| BFLA (API5) | DELETE/PUT on read-only endpoints |
+| Injection (API8) | SQL/NoSQL patterns in params |
+
+## Injection Regex Patterns
+
+```python
+sql = r"union\s+select|drop\s+table|'\s*or\s+'1'"
+nosql = r"\$ne|\$gt|\$regex|\$where"
+xss = r"
+
Your document is downloading. If the download does not start,
+click here.