MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code
Exploit the noPac vulnerability chain (CVE-2021-42278 sAMAccountName spoofing and CVE-2021-42287 KDC PAC confusion)
Detect and exploit NoSQL injection vulnerabilities in MongoDB, CouchDB, and other NoSQL databases to demonstrate
Identifying and exploiting OAuth 2.0 and OpenID Connect misconfigurations including redirect URI manipulation,
Detect and exploit JavaScript prototype pollution vulnerabilities on both client-side and server-side applications
Detect and exploit race condition vulnerabilities in web applications using Turbo Intruder's single-packet attack
Identifying and exploiting SSRF vulnerabilities to access internal services, cloud metadata, and restricted network
'Identifies and exploits SMB protocol vulnerabilities using Metasploit Framework during authorized penetration
'Identifies and exploits SQL injection vulnerabilities in web applications during authorized penetration tests
Detecting and exploiting SQL injection vulnerabilities using sqlmap to extract database contents during authorized
Detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities across Jinja2, Twig, Freemarker,
Exploit PHP type juggling vulnerabilities caused by loose comparison operators to bypass authentication, circumvent
The Metasploit Framework is the world's most widely used penetration testing platform, maintained by Rapid7.
Testing WebSocket implementations for authentication bypass, cross-site hijacking, injection attacks, and insecure
Exploit the Zerologon vulnerability (CVE-2020-1472) in the Netlogon Remote Protocol to achieve domain controller
Extract and analyze browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge
Extract embedded configuration from Agent Tesla RAT samples including SMTP/FTP/Telegram exfiltration credentials,
Extract cached credentials, password hashes, Kerberos tickets, and authentication tokens from memory dumps using
'Extracts indicators of compromise (IOCs) from malware samples including file hashes, network indicators (IPs,
'Uses Rekall memory forensics framework to analyze memory dumps for process hollowing, injected code via VAD
Extract, parse, and analyze Windows Event Logs (EVTX) using Chainsaw, Hayabusa, and EvtxECmd to detect lateral
'Generates structured cyber threat intelligence reports at strategic, operational, and tactical levels tailored
Hardening Docker containers for production involves applying security best practices aligned with CIS Docker
Harden the Docker daemon by configuring daemon.json with user namespace remapping, TLS authentication, rootless
'Hardens Linux endpoints using CIS Benchmark recommendations for Ubuntu, RHEL, and CentOS to reduce attack surface,
'Hardens Windows endpoints using CIS (Center for Internet Security) Benchmark recommendations to reduce attack
'Proactively hunts for Advanced Persistent Threat (APT) activity within enterprise environments using hypothesis-driven
'Detects credential stuffing attacks by analyzing authentication logs for login velocity anomalies, ASN diversity,
'Hunt for malicious PowerShell activity by analyzing Script Block Logging (Event 4104), Module Logging (Event
Identify command-and-control beaconing patterns in network traffic by applying statistical frequency analysis,
Detect Cobalt Strike beacon network activity using default TLS certificate signatures (serial 8BB00EE), JA3/JA3S/JARM
Detect C2 beaconing patterns in network traffic using frequency analysis, jitter detection, and domain reputation
Hunt for data exfiltration through network traffic analysis, detecting unusual data flows, DNS tunneling, cloud
Detect data staging activity before exfiltration by monitoring for archive creation with 7-Zip/RAR, unusual temp
'Hunt for DCOM-based lateral movement by detecting abuse of MMC20.Application, ShellBrowserWindow, and ShellWindows
Detect DCSync attacks by analyzing Windows Event ID 4662 for unauthorized DS-Replication-Get-Changes requests
'Detect NTFS timestamp manipulation (MITRE T1070.006) by comparing $STANDARD_INFORMATION vs $FILE_NAME timestamps
Hunt for DNS-based persistence mechanisms including DNS hijacking, dangling CNAME records, wildcard DNS abuse,
Detect DNS tunneling and data exfiltration by analyzing Zeek dns.log for high-entropy subdomain queries, excessive
Detect domain fronting C2 traffic by analyzing SNI vs HTTP Host header mismatches in proxy logs and TLS certificate
Detect WMI-based lateral movement by analyzing Windows Event ID 4688 process creation and Sysmon Event ID 1 for
Hunt for adversary abuse of legitimate cloud services for C2, data staging, and exfiltration including abuse
Proactively hunt for adversary abuse of legitimate system binaries (LOLBins) to execute malicious payloads while
Hunt for adversary abuse of Living Off the Land Binaries (LOLBins) by analyzing endpoint process creation logs
Detect NTLM relay attacks by analyzing Windows Event 4624 logon type 3 with NTLMSSP authentication, identifying
Systematically hunt for adversary persistence mechanisms across Windows endpoints including registry, services,
Hunt for adversary persistence through Windows Management Instrumentation event subscriptions by monitoring WMI
Detect process injection techniques (T1055) including CreateRemoteThread, process hollowing, and DLL injection
Hunt for registry-based persistence mechanisms including Run keys, Winlogon modifications, IFEO injection, and
Detect MITRE ATT&CK T1547.001 registry Run key persistence by analyzing Sysmon Event ID 13 logs and registry