Back to categories
Category

Agent Skills in category: Uncategorized

72246 skills match this category. Browse curated collections and explore related Agent Skills.

detecting-email-forwarding-rules-attack

Detect malicious email forwarding rules created by adversaries to maintain persistent access to email communications for intelligence collection and BEC attacks.

plurigrid
plurigrid
165

detecting-evasion-techniques-in-endpoint-logs

>

plurigrid
plurigrid
165

detecting-exfiltration-over-dns-with-zeek

Detect DNS-based data exfiltration by analyzing Zeek dns.log for high-entropy subdomains and anomalous query patterns

plurigrid
plurigrid
165

detecting-fileless-attacks-on-endpoints

>

plurigrid
plurigrid
165

detecting-fileless-malware-techniques

>

plurigrid
plurigrid
165

detecting-golden-ticket-attacks-in-kerberos-logs

Detect Golden Ticket attacks in Active Directory by analyzing Kerberos TGT anomalies including mismatched encryption types, impossible ticket lifetimes, non-existent accounts, and forged PAC signatures in domain controller event logs.

plurigrid
plurigrid
165

detecting-golden-ticket-forgery

Detect Kerberos Golden Ticket forgery by analyzing Windows Event ID 4769 for RC4 encryption downgrades (0x17), abnormal ticket lifetimes, and krbtgt account anomalies in Splunk and Elastic SIEM

plurigrid
plurigrid
165

detecting-insider-data-exfiltration-via-dlp

>

plurigrid
plurigrid
165

detecting-insider-threat-behaviors

Detect insider threat behavioral indicators including unusual data access, off-hours activity, mass file downloads, privilege abuse, and resignation-correlated data theft.

plurigrid
plurigrid
165

detecting-insider-threat-with-ueba

Implement User and Entity Behavior Analytics using Elasticsearch/OpenSearch to build behavioral baselines, calculate anomaly scores, perform peer group analysis, and detect insider threat indicators such as data exfiltration, privilege abuse, and unauthorized access patterns.

plurigrid
plurigrid
165

detecting-lateral-movement-with-splunk

Detect adversary lateral movement across networks using Splunk SPL queries against Windows authentication logs, SMB traffic, and remote service abuse.

plurigrid
plurigrid
165

detecting-lateral-movement-with-zeek

>

plurigrid
plurigrid
165

detecting-living-off-the-land-attacks

>

plurigrid
plurigrid
165

detecting-living-off-the-land-with-lolbas

Detect Living Off the Land Binaries (LOLBins/LOLBAS) abuse including certutil, regsvr32, mshta, and rundll32 via process telemetry, Sigma rules, and parent-child process analysis

plurigrid
plurigrid
165

detecting-malicious-scheduled-tasks-with-sysmon

>

plurigrid
plurigrid
165

detecting-mimikatz-execution-patterns

Detect Mimikatz execution through command-line patterns, LSASS access signatures, binary indicators, and in-memory detection of known modules.

plurigrid
plurigrid
165

detecting-misconfigured-azure-storage

>

plurigrid
plurigrid
165

detecting-mobile-malware-behavior

>

plurigrid
plurigrid
165

detecting-modbus-command-injection-attacks

>

plurigrid
plurigrid
165

detecting-modbus-protocol-anomalies

>

plurigrid
plurigrid
165

detecting-network-anomalies-with-zeek

>

plurigrid
plurigrid
165

detecting-network-scanning-with-ids-signatures

Detect network reconnaissance and port scanning using Suricata and Snort IDS signatures, threshold-based detection rules, and traffic anomaly analysis to identify Nmap, Masscan, and custom scanning activity.

plurigrid
plurigrid
165

detecting-ntlm-relay-with-event-correlation

>

plurigrid
plurigrid
165

detecting-oauth-token-theft

>

plurigrid
plurigrid
165

detecting-pass-the-hash-attacks

Detect Pass-the-Hash attacks by analyzing NTLM authentication patterns, identifying Type 3 logons with NTLM where Kerberos is expected, and correlating with credential dumping.

plurigrid
plurigrid
165

detecting-pass-the-ticket-attacks

Detect Kerberos Pass-the-Ticket (PtT) attacks by analyzing Windows Event IDs 4768, 4769, and 4771 for anomalous ticket usage patterns in Splunk and Elastic SIEM

plurigrid
plurigrid
165

detecting-port-scanning-with-fail2ban

>

plurigrid
plurigrid
165

detecting-privilege-escalation-attempts

Detect privilege escalation attempts including token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse across Windows and Linux.

plurigrid
plurigrid
165

detecting-privilege-escalation-in-kubernetes-pods

Detect and prevent privilege escalation in Kubernetes pods by monitoring security contexts, capabilities, and syscall patterns with Falco and OPA policies.

plurigrid
plurigrid
165

detecting-process-hollowing-technique

Detect process hollowing (T1055.012) by analyzing memory-mapped sections, hollowed process indicators, and parent-child process anomalies in EDR telemetry.

plurigrid
plurigrid
165

detecting-process-injection-techniques

>

plurigrid
plurigrid
165

detecting-qr-code-phishing-with-email-security

Detect and prevent QR code phishing (quishing) attacks that bypass traditional email security by embedding malicious URLs in QR code images within emails.

plurigrid
plurigrid
165

detecting-rdp-brute-force-attacks

Detect RDP brute force attacks by analyzing Windows Security Event Logs for failed authentication patterns (Event ID 4625), successful logons after failures (Event ID 4624), NLA failures, and source IP frequency analysis.

plurigrid
plurigrid
165

detecting-rootkit-activity

>

plurigrid
plurigrid
165

detecting-s3-data-exfiltration-attempts

>

plurigrid
plurigrid
165

detecting-serverless-function-injection

>

plurigrid
plurigrid
165

detecting-service-account-abuse

Detect abuse of service accounts through anomalous interactive logons, privilege escalation, lateral movement, and unauthorized access patterns.

plurigrid
plurigrid
165

detecting-shadow-api-endpoints

Discover and inventory shadow API endpoints that operate outside documented specifications using traffic analysis, code scanning, and API discovery platforms.

plurigrid
plurigrid
165

detecting-shadow-it-cloud-usage

Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow data using Python pandas for traffic pattern analysis and domain classification.

plurigrid
plurigrid
165

detecting-spearphishing-with-email-gateway

Spearphishing targets specific individuals using personalized, researched content that bypasses generic spam filters. Email security gateways (SEGs) like Microsoft Defender for Office 365, Proofpoint,

plurigrid
plurigrid
165

detecting-sql-injection-via-waf-logs

>-

plurigrid
plurigrid
165

detecting-stuxnet-style-attacks

>

plurigrid
plurigrid
165

detecting-supply-chain-attacks-in-ci-cd

>

plurigrid
plurigrid
165

detecting-suspicious-oauth-application-consent

Detect risky OAuth application consent grants in Azure AD / Microsoft Entra ID using Microsoft Graph API, audit logs, and permission analysis to identify illicit consent grant attacks.

plurigrid
plurigrid
165

detecting-suspicious-powershell-execution

Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts, and constrained language mode evasion.

plurigrid
plurigrid
165

detecting-t1003-credential-dumping-with-edr

Detect OS credential dumping techniques targeting LSASS memory, SAM database, NTDS.dit, and cached credentials using EDR telemetry, Sysmon process access monitoring, and Windows security event correlation.

plurigrid
plurigrid
165

detecting-t1055-process-injection-with-sysmon

Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection by analyzing Sysmon events for cross-process memory operations, remote thread creation, and anomalous DLL loading patterns.

plurigrid
plurigrid
165

detecting-t1548-abuse-elevation-control-mechanism

Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation by monitoring registry modifications, process elevation flags, and unusual parent-child process relationships.

plurigrid
plurigrid
165

detecting-typosquatting-packages-in-npm-pypi

>

plurigrid
plurigrid
165

detecting-wmi-persistence

Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter, EventConsumer, and FilterToConsumerBinding creation.

plurigrid
plurigrid
165

Page 309 of 1445 · 72246 results