Search Skills
Search across 54932 indexed skills
testing-for-email-header-injection
When testing contact forms, feedback forms, or "email a friend" functionality During assessment of password reset email functionality When testing new...
analyzing-indicators-of-compromise
Use this skill when: A phishing email or alert generates IOCs (URLs, IP addresses, file hashes) requiring rapid triage Automated feeds deliver bulk IO...
implementing-network-access-control-with-cisco-ise
Cisco Identity Services Engine (ISE) provides centralized network access control through 802.1X authentication, MAC Authentication Bypass (MAB), postu...
evaluating-threat-intelligence-platforms
Use this skill when: Conducting a formal RFP or vendor evaluation for a TIP solution Assessing whether the current TIP (e.g., MISP) needs to be replac...
deobfuscating-javascript-malware
Investigating a phishing page with obfuscated JavaScript that performs credential harvesting or redirect Analyzing a web skimmer (Magecart-style) inje...
performing-network-packet-capture-analysis
Network packet captures (PCAP/PCAPNG files) represent the ultimate source of truth about network activity and provide irrefutable evidence of communic...
implementing-digital-signatures-with-ed25519
Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit security with 64-byte signatures and...
analyzing-web-server-logs-for-intrusion
When investigating security incidents that require analyzing web server logs for intrusion When building detection rules or threat hunting queries for...
implementing-browser-isolation-for-zero-trust
When deploying remote browser isolation as part of a Zero Trust security architecture When protecting users from zero-day browser exploits and drive-b...
performing-disk-forensics-investigation
A security incident requires forensic analysis of a system's persistent storage Evidence preservation is needed for potential legal proceedings or HR ...
performing-cve-prioritization-with-kev-catalog
The CISA Known Exploited Vulnerabilities (KEV) catalog, established through Binding Operational Directive (BOD) 22-01, is a living list of CVEs that h...
performing-subdomain-enumeration-with-subfinder
During the reconnaissance phase of penetration testing or bug bounty hunting When mapping the external attack surface of a target organization Before ...