Protocol Analysis

Protocol Analysis skills and workflows surfaced by the site skill importer.

9 skills
M
detecting-modbus-protocol-anomalies

by mukul975

detecting-modbus-protocol-anomalies helps detect suspicious Modbus/TCP and Modbus RTU behavior in OT and ICS networks, including invalid function codes, out-of-range register access, abnormal polling timing, unauthorized writes, and malformed frames. Useful for a Security Audit and evidence-based triage.

Security Audit
Favorites 0GitHub 6.1k
M
detecting-modbus-command-injection-attacks

by mukul975

detecting-modbus-command-injection-attacks helps security analysts spot suspicious Modbus TCP/RTU write activity, anomalous function codes, malformed frames, and baseline deviations in ICS and SCADA environments. Use it for incident triage, OT monitoring, and a Security Audit when you need Modbus-aware detection guidance, not a generic anomaly prompt.

Security Audit
Favorites 0GitHub 6.1k
M
analyzing-network-traffic-for-incidents

by mukul975

analyzing-network-traffic-for-incidents helps incident responders analyze PCAPs, flow logs, and packet captures to confirm C2, lateral movement, exfiltration, and exploitation attempts. Built for analyzing-network-traffic-for-incidents for Incident Response with Wireshark, Zeek, and NetFlow-style investigation.

Incident Response
Favorites 0GitHub 0
M
detecting-dnp3-protocol-anomalies

by mukul975

detecting-dnp3-protocol-anomalies helps analyze DNP3 traffic in SCADA environments to flag unauthorized control commands, protocol violations, restart attempts, and deviations from baseline behavior. Use this detecting-dnp3-protocol-anomalies skill for Security Audit, IDS tuning, and reviewing Zeek logs or packet captures.

Security Audit
Favorites 0GitHub 0
M
detecting-attacks-on-scada-systems

by mukul975

detecting-attacks-on-scada-systems is a cybersecurity skill for spotting attacks on SCADA and OT/ICS environments. It helps analyze industrial protocol abuse, unauthorized PLC commands, HMI compromise, historian tampering, and denial-of-service, with practical guidance for incident response and detection validation.

Incident Response
Favorites 0GitHub 0
M
configuring-suricata-for-network-monitoring

by mukul975

The configuring-suricata-for-network-monitoring skill helps deploy and tune Suricata for IDS/IPS monitoring, EVE JSON logging, rules management, and SIEM-ready output. It suits the configuring-suricata-for-network-monitoring for Security Audit workflow when you need practical setup, validation, and false-positive reduction.

Security Audit
Favorites 0GitHub 0
M
building-c2-infrastructure-with-sliver-framework

by mukul975

building-c2-infrastructure-with-sliver-framework helps authorized red team and Security Audit work plan, install, and use Sliver-based C2 infrastructure with redirectors, HTTPS listeners, operator access, and resilience checks. It includes a practical guide, workflow files, and repo scripts for deployment and validation.

Security Audit
Favorites 0GitHub 0
M
analyzing-network-traffic-of-malware

by mukul975

analyzing-network-traffic-of-malware helps inspect PCAPs and telemetry from sandbox runs or incident response to find C2, exfiltration, payload downloads, DNS tunneling, and detection ideas. It is a practical analyzing-network-traffic-of-malware guide for Security Audit and malware triage.

Security Audit
Favorites 0GitHub 0
M
analyzing-command-and-control-communication

by mukul975

analyzing-command-and-control-communication helps analyze malware C2 traffic to identify beaconing, decode commands, map infrastructure, and support Security Audit, threat hunting, and malware triage with PCAP-based evidence and practical workflow guidance.

Security Audit
Favorites 0GitHub 0