Search Skills
Search across 54932 indexed skills
snowflake-migration-deep-dive
Comprehensive guide for migrating to Snowflake from Redshift, BigQuery, on-prem databases, or other data warehouses. | Source | Complexity | Duration ...
flyio-core-workflow-b
Set up Fly Postgres, persistent Fly Volumes, and private networking between apps. Fly Postgres runs as a regular Fly app with automated replication. V...
persona-core-workflow-b
Work with Persona's verification types: government ID (passport, driver's license), selfie liveness detection, and database checks (SSN, watchlist). C...
notion-core-workflow-a
Primary workflow for Notion integrations: querying databases with filters/sorts, creating pages with typed properties, updating page properties, and r...
performing-privileged-account-discovery
Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local admins, service accounts, database admi...
exploiting-nosql-injection-vulnerabilities
During web application penetration testing of applications using NoSQL databases When testing authentication mechanisms backed by MongoDB or similar d...
implementing-honeytokens-for-breach-detection
When deploying or configuring implementing honeytokens for breach detection capabilities in your environment When establishing security controls align...
deploying-ransomware-canary-files
Deploying proactive ransomware detection on file servers, NAS devices, or endpoint systems Building an early-warning system that detects ransomware be...
detecting-t1003-credential-dumping-with-edr
When hunting for credential theft activity in the environment After compromise indicators suggest attacker has elevated privileges When EDR alerts fir...
implementing-gdpr-data-subject-access-request
When building automated DSAR processing pipelines for GDPR/UK GDPR compliance When implementing PII discovery across structured and unstructured data ...
performing-service-account-credential-rotation
Service accounts are non-human identities used by applications, daemons, CI/CD pipelines, and automated processes to authenticate to systems and APIs....
analyzing-sbom-for-supply-chain-vulnerabilities
A new regulatory requirement (EO 14028, EU CRA) mandates SBOM analysis for software deliveries Security team needs to assess third-party risk by scann...