Search Skills
Search across 54932 indexed skills
analyzing-powershell-empire-artifacts
PowerShell Empire is a post-exploitation framework consisting of listeners, stagers, and agents. Its artifacts leave detectable traces in Windows even...
performing-hash-cracking-with-hashcat
Hash cracking is an essential skill for penetration testers and security auditors to evaluate password strength. Hashcat is the world's fastest passwo...
analyzing-pdf-malware-with-pdfid
A suspicious PDF attachment has been flagged by email security or reported by a user You need to determine if a PDF contains embedded JavaScript, shel...
detecting-aws-iam-privilege-escalation
This skill uses boto3 and Cloudsplaining-style analysis to identify IAM privilege escalation paths in AWS accounts. It downloads the account authoriza...
performing-cloud-asset-inventory-with-cartography
Cartography is a CNCF sandbox project (originally created at Lyft) that consolidates infrastructure assets and their relationships into a Neo4j graph ...
detecting-insider-threat-with-ueba
User and Entity Behavior Analytics (UEBA) moves beyond static rule-based detection to model normal behavior for users, hosts, and applications, then f...
configuring-oauth2-authorization-flow
Configure secure OAuth 2.0 authorization flows including Authorization Code with PKCE, Client Credentials, and Device Authorization Grant. This skill ...
implementing-network-access-control
Enforcing identity-based network access where only authenticated and compliant devices connect to the network Implementing zero-trust networking at th...
implementing-vulnerability-sla-breach-alerting
Vulnerability remediation SLAs define maximum timeframes for addressing security findings based on severity. This skill covers building an automated a...
detecting-broken-object-property-level-authorization
Broken Object Property Level Authorization (BOPLA), classified as API3:2023 in the OWASP API Security Top 10, combines two related vulnerability class...
performing-cloud-native-threat-hunting-with-aws-detective
AWS Detective automatically collects and analyzes log data from AWS CloudTrail, VPC Flow Logs, GuardDuty findings, and EKS audit logs to build interac...
performing-paste-site-monitoring-for-credentials
Paste sites (Pastebin, GitHub Gists, Ghostbin, Dpaste, Hastebin) are frequently used as staging areas for leaked credentials, database dumps, API keys...