Search Skills
Search across 54932 indexed skills
building-ioc-defanging-and-sharing-pipeline
IOC defanging modifies potentially malicious indicators (URLs, IP addresses, domains, email addresses) to prevent accidental clicks or execution while...
building-ioc-enrichment-pipeline-with-opencti
OpenCTI is an open-source platform for managing cyber threat intelligence knowledge, built on STIX 2.1 as its native data model. This skill covers bui...
building-malware-incident-communication-template
Effective communication during malware incidents is critical for coordinated response, stakeholder management, and regulatory compliance. A structured...
conducting-domain-persistence-with-dcsync
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...
conducting-full-scope-red-team-engagement
A full-scope red team engagement simulates real-world adversary behavior across all phases of the cyber kill chain — from initial reconnaissance throu...
conducting-internal-network-penetration-test
An internal network penetration test simulates an attacker who has already gained access to the internal network or a malicious insider. The tester op...
building-ransomware-playbook-with-cisa-framework
An organization needs to create or update its ransomware incident response playbook following CISA guidelines A security team is conducting a ransomwa...
building-soc-escalation-matrix
A SOC escalation matrix defines how security incidents move through the organization based on severity, impact, and response requirements. Modern SOCs...
building-threat-actor-profile-from-osint
Threat actor profiling using OSINT systematically gathers and analyzes publicly available information to build comprehensive profiles of adversary gro...
building-devsecops-pipeline-with-gitlab-ci
GitLab provides an integrated DevSecOps platform that embeds security testing directly into the CI/CD pipeline. By leveraging GitLab's built-in securi...
building-incident-response-playbook
Establishing or maturing an incident response program from scratch Documenting procedures for a new incident type after a novel attack Automating resp...
auditing-terraform-infrastructure-for-security
When integrating security scanning into CI/CD pipelines for Terraform deployments When reviewing Terraform plans and modules for security best practic...