npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
- When proactively hunting for indicators of hunting for living off the cloud techniques in the environment
Guides threat hunting for adversaries abusing AWS, Azure, GCP, and SaaS for C2, data staging, exfiltration using EDR/SIEM workflows. For incident response or assessments.
Hunts attackers abusing Azure, AWS, GCP, and SaaS platforms for C2, data staging, and exfiltration. Guides EDR/SIEM queries for proactive threat hunting and incident response.
Detects compromised cloud credentials in AWS, Azure, GCP via GuardDuty findings, anomalous API activity, impossible travel, and unauthorized provisioning. Useful for investigating unusual cloud alerts.
Share bugs, ideas, or general feedback.
| Concept | Description |
|---|---|
| T1102 | Web Service |
| T1567 | Exfiltration Over Web Service |
| T1537 | Transfer Data to Cloud Account |
| Tool | Purpose |
|---|---|
| CrowdStrike Falcon | EDR telemetry and threat detection |
| Microsoft Defender for Endpoint | Advanced hunting with KQL |
| Splunk Enterprise | SIEM log analysis with SPL queries |
| Elastic Security | Detection rules and investigation timeline |
| Sysmon | Detailed Windows event monitoring |
| Velociraptor | Endpoint artifact collection and hunting |
| Sigma Rules | Cross-platform detection rule format |
Hunt ID: TH-HUNTIN-[DATE]-[SEQ]
Technique: T1102
Host: [Hostname]
User: [Account context]
Evidence: [Log entries, process trees, network data]
Risk Level: [Critical/High/Medium/Low]
Confidence: [High/Medium/Low]
Recommended Action: [Containment, investigation, monitoring]