analyzing-malicious-pdf-with-peepdf
Perform static analysis of malicious PDF documents using peepdf, pdfid, and pdf-parser to extract embedded JavaScript, shellcode, and suspicious objects.
analyzing-macro-malware-in-office-documents
>
analyzing-lnk-file-and-jump-list-artifacts
Analyze Windows LNK shortcut files and Jump List artifacts to establish evidence of file access, program execution, and user activity using LECmd, JLECmd, and manual binary parsing of the Shell Link Binary format.
analyzing-linux-system-artifacts
Examine Linux system artifacts including auth logs, cron jobs, shell history, and system configuration to uncover evidence of compromise or unauthorized activity.
analyzing-linux-kernel-rootkits
Detect kernel-level rootkits in Linux memory dumps using Volatility3 linux plugins (check_syscall, lsmod, hidden_modules), rkhunter system scanning, and /proc vs /sys discrepancy analysis to identify hooked syscalls, hidden kernel modules, and tampered system structures.
lhott-cohesive-linear
Cohesive Linear HoTT patterns for interaction entropy with diagram generation. Implements Schreiber's cohesive modalities (♯,♭,ʃ) and Riley's linear modality (♮) for quantum-classical bridging.
koopman-generator
Koopman operator theory for infinite-dimensional linear lifting of nonlinear dynamics. Generates dynamics from observables.
influence-propagation
Layer 7 Interperspectival Network Analysis and Influence Flow
external
External skill interface for integration with external systems
entropy-sequencer
Layer 5 Interaction Interleaving for Maximum Information Gain with DuckDB
duck-time-travel
SKILL: Duck Time Travel
constraint-generalization
Generalization and composition of constraints across navigators
condensed-analytic-stacks
Scholze-Clausen condensed mathematics bridge to sheaf neural networks via 6-functor formalism
analyzing-packed-malware-with-upx-unpacker
>
analyzing-pdf-malware-with-pdfid
>
analyzing-persistence-mechanisms-in-linux
Detect and analyze Linux persistence mechanisms including crontab entries, systemd service units, LD_PRELOAD hijacking, bashrc modifications, and authorized_keys backdoors using auditd and file integrity monitoring
analyzing-powershell-empire-artifacts
Detect PowerShell Empire framework artifacts in Windows event logs by identifying Base64 encoded launcher patterns, default user agents, staging URL structures, stager IOCs, and known Empire module signatures in Script Block Logging events.
analyzing-powershell-script-block-logging
>-
analyzing-network-traffic-of-malware
>
analyzing-prefetch-files-for-execution-history
Parse Windows Prefetch files to determine program execution history including run counts, timestamps, and referenced files for forensic investigation.
analyzing-office365-audit-logs-for-compromise
Parse Office 365 Unified Audit Logs via Microsoft Graph API to detect email forwarding rule creation, inbox delegation, suspicious OAuth app grants, and other indicators of account compromise.
analyzing-outlook-pst-for-email-forensics
Analyze Microsoft Outlook PST and OST files for email forensic evidence including message content, headers, attachments, deleted items, and metadata using libpff, pst-utils, and forensic email analysis tools for legal investigations and incident response.
analyzing-network-traffic-for-incidents
>
analyzing-network-packets-with-scapy
Craft, send, sniff, and dissect network packets using Scapy for protocol analysis, network reconnaissance, and traffic anomaly detection in authorized security testing
analyzing-network-traffic-with-wireshark
>
analyzing-network-flow-data-with-netflow
>-
analyzing-network-covert-channels-in-malware
Detect and analyze covert communication channels used by malware including DNS tunneling, ICMP exfiltration, steganographic HTTP, and protocol abuse for C2 and data exfiltration.
analyzing-mft-for-deleted-file-recovery
Analyze the NTFS Master File Table ($MFT) to recover metadata and content of deleted files by examining MFT record entries, $LogFile, $UsnJrnl, and MFT slack space using MFTECmd, analyzeMFT, and X-Ways Forensics.
analyzing-memory-forensics-with-lime-and-volatility
>
analyzing-memory-dumps-with-volatility
>
analyzing-malware-sandbox-evasion-techniques
Detect sandbox evasion techniques in malware samples by analyzing timing checks, VM artifact queries, user interaction detection, and sleep inflation patterns from Cuckoo/AnyRun behavioral reports
analyzing-malware-persistence-with-autoruns
Use Sysinternals Autoruns to systematically identify and analyze malware persistence mechanisms across registry keys, scheduled tasks, services, drivers, and startup locations on Windows systems.
analyzing-malware-family-relationships-with-malpedia
Use the Malpedia platform and API to research malware family relationships, track variant evolution, link families to threat actors, and integrate YARA rules for detection across malware lineages.
analyzing-malware-behavior-with-cuckoo-sandbox
>
analyzing-malicious-url-with-urlscan
URLScan.io is a free service for scanning and analyzing suspicious URLs. It captures screenshots, DOM content, HTTP transactions, JavaScript behavior, and network connections of web pages in an isolat
analyzing-linux-elf-malware
>
persistent-homology
Topological data analysis for stable feature verification across filtrations of code complexity.
analyzing-cloud-storage-access-patterns
>-
aptos-orderless-wev
Aptos Orderless WEV Skill
turing-chemputer
Cronin's Turing-complete chemputer for programmable chemical synthesis via XDL.
system2-attention
System 2 attention mechanisms for deliberate, slow reasoning in transformer architectures.
synthetic-adjunctions
Synthetic adjunctions in directed type theory for ∞-categorical universal constructions.
reafference-corollary-discharge
Skill: Reafference & Corollary Discharge (von Holst Neuroscience)
mcp-tripartite
SKILL: MCP Tripartite Integration
elements-infinity-cats
Elements of ∞-Category Theory (Riehl-Verity) for foundational ∞-categorical constructions and model-independence.
duckdb-temporal-versioning
Temporal versioning and interaction history with time-travel queries, causality tracking, and deterministic replay
crn-topology
Chemical Reaction Network topology for generating and analyzing reaction graph structures.
covariant-fibrations
Riehl-Shulman covariant fibrations for dependent types over directed intervals in synthetic ∞-categories.
compression-progress
Schmidhuber's compression progress as intrinsic curiosity reward for learning systems.
assembly-index
Lee Cronin's Assembly Theory for molecular complexity measurement and life detection via assembly index computation.
Page 862 of 1486 · 74266 results
