Search Skills
Search across 54932 indexed skills
implementing-endpoint-dlp-controls
Use this skill when: Deploying endpoint DLP to prevent sensitive data (PII, PHI, PCI) from leaving the organization Configuring content inspection rul...
analyzing-threat-landscape-with-misp
When investigating security incidents that require analyzing threat landscape with misp When building detection rules or threat hunting queries for th...
configuring-multi-factor-authentication-with-duo
Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration method...
detecting-kerberoasting-attacks
When proactively hunting for indicators of detecting kerberoasting attacks in the environment After threat intelligence indicates active campaigns usi...
detecting-dns-exfiltration-with-dns-query-analysis
DNS exfiltration exploits the Domain Name System as a covert channel to extract data from compromised networks. Attackers encode stolen data into DNS ...
detecting-credential-dumping-techniques
Credential dumping (MITRE ATT&CK T1003) is a post-exploitation technique where adversaries extract authentication credentials from OS memory, registry...
implementing-code-signing-for-artifacts
When establishing artifact integrity verification to prevent supply chain tampering When compliance requires cryptographic proof that build artifacts ...
building-red-team-c2-infrastructure-with-havoc
Havoc is a modern, open-source post-exploitation command and control (C2) framework created by C5pider. It provides a collaborative multi-operator int...
analyzing-browser-forensics-with-hindsight
Hindsight is an open-source browser forensics tool designed to parse artifacts from Google Chrome and other Chromium-based browsers (Microsoft Edge, B...
performing-linux-log-forensics-investigation
Linux systems maintain extensive logs that serve as primary evidence sources in forensic investigations. Unlike Windows Event Logs, Linux logs are typ...
performing-privilege-escalation-on-linux
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...
building-vulnerability-dashboard-with-defectdojo
DefectDojo is an open-source application vulnerability management platform that aggregates findings from 200+ security tools, deduplicates results, tr...