Search Skills
Search across 54932 indexed skills
detecting-cryptomining-in-cloud
When cloud billing alerts indicate unexpected compute cost spikes When GuardDuty generates CryptoCurrency or Impact finding types When investigating c...
performing-physical-intrusion-assessment
Physical intrusion assessment evaluates an organization's physical security controls by attempting to gain unauthorized access to facilities, server r...
detecting-deepfake-audio-in-vishing-attacks
A suspected vishing call used an AI-cloned executive voice to authorize a wire transfer Security operations received a voicemail that sounds like the ...
performing-lateral-movement-detection
Use this skill when: SOC teams need to detect attackers pivoting between systems after initial compromise Incident investigations require tracking an ...
performing-endpoint-vulnerability-remediation
Use this skill when: Remediating vulnerabilities identified by scanners (Nessus, Qualys, Rapid7) Responding to zero-day CVE advisories requiring immed...
scanning-network-with-nmap-advanced
Performing comprehensive asset discovery across large enterprise networks during authorized assessments Enumerating service versions and configuration...
analyzing-malware-family-relationships-with-malpedia
Malpedia is a collaborative platform maintained by Fraunhofer FKIE that catalogs malware families with their aliases, YARA rules, threat actor associa...
performing-android-app-static-analysis-with-mobsf
Use this skill when: Conducting security assessment of Android APK or AAB files before production release Integrating automated mobile security scanni...
implementing-threat-intelligence-lifecycle-management
The threat intelligence lifecycle is a structured, iterative process for transforming raw data into actionable intelligence. Based on the intelligence...
performing-threat-intelligence-sharing-with-misp
MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform designed for collecting, storing, distributing, and sharing...
detecting-mobile-malware-behavior
Use this skill when: Analyzing suspicious mobile applications submitted by users or discovered during incident response Monitoring enterprise mobile f...
securing-azure-with-microsoft-defender
When deploying cloud workload protection across Azure subscriptions and resource groups When establishing a Secure Score baseline and prioritizing sec...