Search Skills
Search across 54932 indexed skills
tracking-regression-tests
Track, manage, and maintain regression test suites across releases to ensure previously fixed bugs stay fixed and existing features remain stable. Map...
performing-security-testing
Automate security vulnerability detection covering OWASP Top 10 categories including SQL injection, XSS, CSRF, broken authentication, and sensitive da...
scanning-accessibility
Validate web applications against WCAG 2.1/2.2 accessibility standards covering perceivability, operability, understandability, and robustness. Combin...
performing-cloud-penetration-testing-with-pacu
When conducting authorized penetration testing of AWS environments When validating the effectiveness of IAM policies, SCPs, and permission boundaries ...
performing-api-security-testing-with-postman
Building repeatable API security test suites for OWASP API Security Top 10 coverage Creating automated security regression tests that run in CI/CD pip...
performing-kubernetes-penetration-testing
Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against the API server, kubelet, etcd, pods...
implementing-api-security-testing-with-42crunch
42Crunch is an API security platform that combines Shift-Left security testing with Shield-Right runtime protection. It provides API Audit for static ...
performing-directory-traversal-testing
During authorized penetration tests when the application handles file paths in URL parameters or request bodies When testing file download, file view,...
performing-gcp-penetration-testing-with-gcpbucketbrute
This skill covers Google Cloud Platform security testing using GCPBucketBrute for storage bucket enumeration and access permission testing, combined w...
performing-purple-team-atomic-testing
Validating detection coverage against specific MITRE ATT&CK techniques Running purple team exercises using Atomic Red Team test library Performing ATT...
conducting-api-security-testing
Testing API endpoints for authorization flaws, injection vulnerabilities, and business logic bypasses Assessing the security of microservices architec...
conducting-cloud-penetration-testing
When performing authorized security assessments of cloud environments before production deployment When validating cloud security controls after a maj...