Search Skills
Search across 54932 indexed skills
performing-kubernetes-etcd-security-assessment
etcd is the distributed key-value store that serves as Kubernetes' backing store for all cluster data, including Secrets, RBAC policies, ConfigMaps, a...
performing-active-directory-vulnerability-assessment
Active Directory (AD) is the primary identity and access management system in most enterprise environments, making it a critical attack target. This s...
building-adversary-infrastructure-tracking-system
Adversary infrastructure tracking uses passive DNS records, certificate transparency logs, WHOIS registration data, and IP enrichment to discover, map...
performing-ios-app-security-assessment
This skill is intended for authorized security testing, penetration testing engagements, CTF competitions, and educational purposes only. Unauthorized...
performing-cloud-log-forensics-with-athena
When investigating AWS security incidents that require querying massive volumes of cloud logs When performing forensic analysis across CloudTrail, VPC...
performing-container-escape-detection
When conducting security assessments that involve performing container escape detection When following incident response procedures for related securi...
hunting-for-living-off-the-cloud-techniques
When proactively hunting for indicators of hunting for living off the cloud techniques in the environment After threat intelligence indicates active c...
implementing-passwordless-authentication-with-fido2
Deploy FIDO2/WebAuthn passwordless authentication using security keys and platform authenticators. Covers WebAuthn API integration, FIDO2 server confi...
hunting-for-process-injection-techniques
Process injection (MITRE ATT&CK T1055) allows adversaries to execute code in the address space of another process, enabling defense evasion and privil...
testing-api-for-mass-assignment-vulnerability
Testing API endpoints that accept JSON/XML request bodies for user profile updates, registration, or object creation Assessing whether the API binds a...
performing-container-image-hardening
When building production container images that need minimal attack surface When compliance requires CIS Docker Benchmark adherence for container confi...
building-patch-tuesday-response-process
Microsoft releases security updates on the second Tuesday of each month ("Patch Tuesday"), addressing vulnerabilities across Windows, Office, Exchange...