Collection28 items

sherifeldeeb/agentskills

View on GitHub
2stars

🎯Skills28

🎯network-forensics🎯Skill

Analyzes network traffic captures, extracts forensic insights, identifies potential security incidents, and provides detailed packet-level investigation reports

network-forensics
🎯pptx🎯Skill

Generates, modifies, and analyzes PowerPoint presentations by extracting content, creating slides, and performing advanced document manipulations

pptx
🎯cloud-forensics🎯Skill

Performs comprehensive digital forensics analysis on cloud infrastructure, extracting and investigating logs, network traffic, and system artifacts across cloud platforms.

cloud-forensics
🎯browser-forensics🎯Skill

Extracts and analyzes browser artifacts, cookies, history, and cached data for digital forensics and cybersecurity investigations.

browser-forensics
🎯remediation🎯Skill

Identifies security vulnerabilities in code and provides actionable remediation steps to improve system resilience and patch potential exploits

remediation
🎯log-forensics🎯Skill

Analyzes system and application logs to detect security incidents, trace anomalies, and provide detailed forensic insights for incident response.

log-forensics
🎯incident-response🎯Skill

Rapidly assess, triage, and develop strategic mitigation plans for cybersecurity incidents with comprehensive threat analysis and response workflows.

incident-response
🎯docx🎯Skill

Reads, writes, and manipulates Microsoft Word documents, extracting text, tables, and formatting with Python-based processing

docx
🎯detection🎯Skill

Identifies and classifies objects, anomalies, and patterns in images, videos, and sensor data using advanced computer vision techniques

detection
🎯artifact-collection🎯Skill

Automates systematic collection, categorization, and preservation of digital artifacts from various sources for forensic analysis and investigation.

artifact-collection
🎯pdf🎯Skill

Enables PDF parsing, text extraction, metadata retrieval, and content analysis with advanced document processing capabilities

pdf
🎯timeline-forensics🎯Skill

Reconstructs digital forensic timelines by parsing log files, system events, and artifacts to trace sequence of actions and potential security incidents.

timeline-forensics
🎯containment🎯Skill

Manages security isolation and resource constraints for processes, preventing system-wide impacts and controlling application behavior.

containment
🎯disk-forensics🎯Skill

Performs comprehensive disk image analysis, extracting file system metadata, recovering deleted files, and identifying potential digital evidence.

disk-forensics
🎯mobile-forensics🎯Skill

Extracts and analyzes digital evidence from mobile devices, supporting forensic investigations with comprehensive data recovery techniques.

mobile-forensics
🎯memory-forensics🎯Skill

Performs advanced memory dump analysis, extracting artifacts, identifying malware, and reconstructing system state for digital forensics investigations

memory-forensics
🎯threat-intelligence🎯Skill

Analyzes cybersecurity threats, correlates indicators of compromise, and provides actionable intelligence for proactive defense strategies.

threat-intelligence
🎯soc-operations🎯Skill

Automates security operations center (SOC) workflows, including incident response, threat detection, log analysis, and compliance reporting.

soc-operations
🎯research🎯Skill

Conducts comprehensive online research, synthesizes information from multiple sources, and generates structured insights on complex topics

research
🎯vulnerability-management🎯Skill

Automates vulnerability scanning, prioritizes risks, and provides actionable remediation strategies for cybersecurity teams and software development lifecycles.

vulnerability-management
🎯image-generation🎯Skill

Generates high-quality images from text prompts using advanced AI models, enabling creative visual content creation across various styles and domains.

image-generation
🎯registry-forensics🎯Skill

Performs comprehensive Windows registry analysis, extracting forensic artifacts, system configurations, and user activity traces for digital investigations.

registry-forensics
🎯forensic-reporting🎯Skill

Extracts and analyforensically analyzes digital evidencets, log files,, artifacts, and traces, and reconstructions multiple data systems for investigative reporting security breach analysis.

forensic-reporting
🎯malware-forensics🎯Skill

Analyzes malware samples, extracts indicators of compromise, and provides detailed forensic insights for cybersecurity investigations

malware-forensics
🎯grc🎯Skill

Generates comprehensive governance, risk, and compliance (GRC) reports and frameworks to assess organizational risk management strategies

grc
🎯skill-name🎯Skill

I apologize, but I cannot generate a meaningful description for a skill named "skill-name" as it appears to be a placeholder. To create an accurate and useful description, I would need the actual n...

skill-name
🎯email-forensics🎯Skill

Analyzes email headers, traces sender origins, detects spoofing, and extracts forensic metadata for cybersecurity investigations

email-forensics
🎯xlsx🎯Skill

Reads, writes, and manipulates Excel spreadsheets with advanced parsing, data extraction, and transformation capabilities

xlsx