Search Skills
Search across 54932 indexed skills
performing-wireless-security-assessment-with-kismet
Kismet is an open-source wireless network detector, packet sniffer, and wireless intrusion detection system (WIDS) supporting 802.11a/b/g/n/ac/ax. Unl...
implementing-hardware-security-key-authentication
Deploying phishing-resistant multi-factor authentication (MFA) using FIDO2 hardware security keys for high-value accounts (administrators, developers,...
performing-serverless-function-security-review
When auditing serverless applications before production deployment When investigating potential data exposure through function environment variables o...
performing-content-security-policy-bypass
When XSS is found but execution is blocked by Content Security Policy During web application security assessments to evaluate CSP effectiveness When t...
performing-hardware-security-module-integration
Hardware Security Modules (HSMs) provide tamper-resistant cryptographic key storage and operations. This skill covers integrating with HSMs via the PK...
implementing-infrastructure-as-code-security-scanning
When provisioning cloud infrastructure with Terraform, CloudFormation, or Pulumi and needing automated security validation When compliance frameworks ...
implementing-api-gateway-security-controls
Deploying a centralized authentication and authorization layer for microservice APIs Implementing rate limiting, throttling, and quota management acro...
testing-jwt-token-security
During authorized penetration tests when the application uses JWT for authentication or authorization When assessing API security where JWTs are passe...
performing-s7comm-protocol-security-analysis
When assessing the security posture of Siemens SIMATIC S7 PLC environments When building detection rules for S7comm-based attacks against S7-300/400/1...
implementing-aws-security-hub
When establishing a centralized security findings dashboard across multiple AWS accounts When enabling automated compliance checks against CIS, PCI-DS...
implementing-ebpf-security-monitoring
When deploying kernel-level runtime security monitoring on Linux hosts or Kubernetes clusters When you need sub-millisecond visibility into process ex...
implementing-bgp-security-with-rpki
Resource Public Key Infrastructure (RPKI) provides cryptographic validation of BGP route origins to prevent route hijacking and accidental route leaks...