Search Skills
Search across 54932 indexed skills
configuring-network-segmentation-with-vlans
Segmenting an enterprise network into isolated security zones (corporate, servers, DMZ, guest, IoT) Meeting compliance requirements (PCI-DSS, HIPAA, S...
building-phishing-reporting-button-workflow
A phishing reporting button empowers users to flag suspicious emails directly from their email client, creating a critical feedback loop between end u...
configuring-snort-ids-for-intrusion-detection
Deploying a network-based intrusion detection system to monitor traffic at key network boundaries Writing custom Snort rules to detect organization-sp...
configuring-windows-defender-advanced-settings
Use this skill when: Configuring Microsoft Defender for Endpoint (MDE) beyond default settings for enhanced protection Implementing Attack Surface Red...
conducting-man-in-the-middle-attack-simulation
Testing whether applications properly validate TLS certificates and enforce encrypted communications Demonstrating the risk of cleartext protocols (HT...
conducting-mobile-app-penetration-test
Testing mobile applications before release to identify security vulnerabilities and data protection issues Conducting compliance assessments against O...
conducting-network-penetration-test
Assessing the security posture of internal or external network infrastructure before or after deployment Validating firewall rules, network segmentati...
conducting-pass-the-ticket-attack
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...
building-vulnerability-scanning-workflow
Use this skill when: SOC teams need to establish or improve recurring vulnerability scanning programs Scan results require prioritization beyond raw C...
bypassing-authentication-with-forced-browsing
During authorized penetration tests to discover hidden or unprotected administrative pages When testing whether authentication is consistently enforce...
collecting-indicators-of-compromise
During active incident response to identify and block adversary infrastructure Post-incident to document all observed adversary artifacts for future d...
collecting-threat-intelligence-with-misp
MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform for gathering, sharing, storing, and correlating Indicators...