Search Skills
Search across 54932 indexed skills
tracking-threat-actor-infrastructure
Threat actor infrastructure tracking involves monitoring and mapping adversary-controlled assets including command-and-control (C2) servers, phishing ...
validating-backup-integrity-for-recovery
Use this skill when: Verifying backup integrity before relying on backups for ransomware recovery Building automated backup validation pipelines that ...
testing-for-broken-access-control
During authorized penetration tests as the primary assessment for OWASP A01:2021 - Broken Access Control When evaluating role-based access control (RB...
testing-for-open-redirect-vulnerabilities
When testing login/logout flows that redirect users to specified URLs During assessment of OAuth authorization endpoints with redirecturi parameters W...
testing-ransomware-recovery-procedures
Use this skill when: Validating that ransomware recovery plans actually work under realistic conditions Measuring RTO (Recovery Time Objective) and RP...
reverse-engineering-android-malware-with-jadx
A suspicious Android APK has been reported as malicious or flagged by mobile threat detection Analyzing Android banking trojans, spyware, SMS stealers...
reverse-engineering-ransomware-encryption-routine
Modern ransomware uses hybrid encryption combining symmetric algorithms (AES-256-CBC/CTR, ChaCha20, Salsa20) for file encryption with asymmetric algor...
securing-container-registry-with-harbor
Harbor is an open-source container registry that provides security features including vulnerability scanning (integrated Trivy), image signing (Notary...
performing-user-behavior-analytics
Use this skill when: SOC teams need to detect compromised accounts through abnormal authentication patterns Insider threat programs require behavioral...
performing-ot-vulnerability-scanning-safely
When conducting vulnerability assessments in OT environments with legacy controllers When implementing continuous vulnerability monitoring without imp...
reverse-engineering-ios-app-with-frida
Use this skill when: Analyzing iOS app internals during authorized security assessments without source code Extracting encryption keys, API secrets, o...
securing-serverless-functions
When deploying Lambda functions or Azure Functions with access to sensitive data or cloud APIs When auditing existing serverless workloads for overly ...