Author Profile: mukul975

Skills published by mukul975 with real stars/downloads and source-aware metadata.

Total Skills

151

Total Stars

0

Total Downloads

712

RSS Feed

Skills Performance

Comparison chart based on real stars and downloads signals from source data.

analyzing-certificate-transparency-for-phishing

9

Stars
0
Downloads
9

analyzing-android-malware-with-apktool

9

Stars
0
Downloads
9

analyzing-network-traffic-with-wireshark

9

Stars
0
Downloads
9

analyzing-api-gateway-access-logs

8

Stars
0
Downloads
8

analyzing-ethereum-smart-contract-vulnerabilities

8

Stars
0
Downloads
8

analyzing-active-directory-acl-abuse

8

Stars
0
Downloads
8

analyzing-apt-group-with-mitre-navigator

8

Stars
0
Downloads
8

analyzing-dns-logs-for-exfiltration

8

Stars
0
Downloads
8

Published Skills

Security

analyzing-certificate-transparency-for-phishing

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-android-malware-with-apktool

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-network-traffic-with-wireshark

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-api-gateway-access-logs

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-ethereum-smart-contract-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-active-directory-acl-abuse

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-apt-group-with-mitre-navigator

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-dns-logs-for-exfiltration

No summary provided by upstream source.

Repository SourceNeeds Review
Security

acquiring-disk-image-with-dd-and-dcfldd

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-email-headers-for-phishing-investigation

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-linux-system-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-browser-forensics-with-hindsight

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-ios-app-security-with-objection

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-network-covert-channels-in-malware

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-network-traffic-of-malware

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-disk-image-with-autopsy

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-docker-container-forensics

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-network-flow-data-with-netflow

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-azure-activity-logs-for-threats

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-network-traffic-for-incidents

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-command-and-control-communication

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-cloud-storage-access-patterns

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-cobalt-strike-malleable-profiles

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-linux-kernel-rootkits

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-cobaltstrike-malleable-c2-profiles

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-indicators-of-compromise

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-linux-audit-logs-for-intrusion

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-network-packets-with-scapy

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-campaign-attribution-evidence

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-cobalt-strike-beacon-configuration

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-bootkit-and-rootkit-samples

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-office365-audit-logs-for-compromise

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-outlook-pst-for-email-forensics

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-heap-spray-exploitation

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-windows-event-logs-in-splunk

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-kubernetes-audit-logs

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-packed-malware-with-upx-unpacker

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-golang-malware-with-ghidra

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-web-server-logs-for-intrusion

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-mft-for-deleted-file-recovery

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-threat-actor-ttps-with-mitre-attack

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-lnk-file-and-jump-list-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-macro-malware-in-office-documents

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-api-injection-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-linux-elf-malware

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-malicious-pdf-with-peepdf

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-nosql-injection-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-tls-certificate-transparency-logs

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-xss-vulnerabilities-with-burpsuite

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-api-security-with-owasp-top-10

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-pdf-malware-with-pdfid

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-threat-intelligence-feeds

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-ransomware-encryption-mechanisms

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-websocket-api-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-malware-behavior-with-cuckoo-sandbox

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-sql-injection-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-oauth2-implementation-flaws

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-xss-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-cloud-security-posture-management

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-xxe-injection-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-mobile-api-authentication

No summary provided by upstream source.

Repository SourceNeeds Review
Security

collecting-open-source-intelligence

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-full-scope-red-team-engagement

No summary provided by upstream source.

Repository SourceNeeds Review
Security

auditing-cloud-with-cis-benchmarks

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-threat-actor-ttps-with-mitre-navigator

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-windows-amcache-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-server-side-request-forgery

No summary provided by upstream source.

Repository SourceNeeds Review
Security

triaging-security-incident

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-cors-misconfiguration

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-vulnerability-dashboard-with-defectdojo

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-ransomware-leak-site-intelligence

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-malware-family-relationships-with-malpedia

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-security-logs-with-splunk

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-api-for-broken-object-level-authorization

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-jwt-token-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-windows-registry-for-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-sql-injection-with-sqlmap

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-cloud-incident-response

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-sensitive-data-exposure

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-xml-injection-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-email-header-injection

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-malware-persistence-with-autoruns

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-phishing-email-headers

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-malware-sandbox-evasion-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-malicious-url-with-urlscan

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-wireless-network-penetration-test

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-active-directory-certificate-services-esc1

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-threat-intelligence-platform

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-vulnerability-aging-and-sla-tracking

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-ransomware-network-indicators

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-business-logic-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-oauth-misconfiguration

No summary provided by upstream source.

Repository SourceNeeds Review
Security

executing-red-team-exercise

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-api-authentication-weaknesses

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-bgp-hijacking-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

tracking-threat-actor-infrastructure

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-memory-dumps-with-volatility

No summary provided by upstream source.

Repository SourceNeeds Review
Security

extracting-browser-history-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

triaging-security-alerts-in-splunk

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-idor-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-memory-forensics-with-lime-and-volatility

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-websocket-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-threat-intelligence-enrichment-in-splunk

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-vulnerability-exception-tracking-system

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-powershell-script-block-logging

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-windows-shellbag-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-web-application-scanning-with-nikto

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-windows-prefetch-with-python

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-broken-access-control

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-typosquatting-domains-with-dnstwist

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-soc-playbook-for-ransomware

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-web-cache-deception-attack

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-usb-device-connection-history

No summary provided by upstream source.

Repository SourceNeeds Review
Security

executing-red-team-engagement-planning

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-mass-assignment-in-rest-apis

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-power-grid-cybersecurity-assessment

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-mobile-app-penetration-test

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-vulnerability-scanning-workflow

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-windows-lnk-files-for-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-web-application-penetration-test

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-network-penetration-test

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-deeplink-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-prefetch-files-for-execution-history

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-host-header-injection

No summary provided by upstream source.

Repository SourceNeeds Review
Security

auditing-azure-active-directory-configuration

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-slack-space-and-file-system-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-vulnerability-scanning-with-nessus

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-threat-intelligence-feed-integration

No summary provided by upstream source.

Repository SourceNeeds Review
Security

auditing-aws-s3-bucket-permissions

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-directory-traversal-testing

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-open-redirect-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-cloud-penetration-testing

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-supply-chain-malware-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-cloud-infrastructure-penetration-test

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-mobile-application-penetration-test

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-persistence-mechanisms-in-linux

No summary provided by upstream source.

Repository SourceNeeds Review
Security

auditing-gcp-iam-permissions

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-threat-landscape-with-misp

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-web-application-firewall-bypass

No summary provided by upstream source.

Repository SourceNeeds Review
Security

bypassing-authentication-with-forced-browsing

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-web-cache-poisoning-attack

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-threat-actor-profile-from-osint

No summary provided by upstream source.

Repository SourceNeeds Review
Security

analyzing-powershell-empire-artifacts

No summary provided by upstream source.

Repository SourceNeeds Review
Security

testing-for-json-web-token-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
Security

exploiting-http-request-smuggling

No summary provided by upstream source.

Repository SourceNeeds Review
Security

collecting-threat-intelligence-with-misp

No summary provided by upstream source.

Repository SourceNeeds Review
Security

collecting-indicators-of-compromise

No summary provided by upstream source.

Repository SourceNeeds Review
Security

conducting-pass-the-ticket-attack

No summary provided by upstream source.

Repository SourceNeeds Review
Security

performing-authenticated-vulnerability-scan

No summary provided by upstream source.

Repository SourceNeeds Review
Security

building-automated-malware-submission-pipeline

No summary provided by upstream source.

Repository SourceNeeds Review
Security

collecting-volatile-evidence-from-compromised-host

No summary provided by upstream source.

Repository SourceNeeds Review
Author mukul975 | V50.AI