Search Skills
Search across 54932 indexed skills
performing-malware-hash-enrichment-with-virustotal
VirusTotal is the world's largest crowdsourced malware corpus, scanning files with 70+ antivirus engines and providing behavioral analysis, YARA rule ...
performing-malware-persistence-investigation
When investigating how malware maintains presence on a compromised system after reboots During incident response to identify all persistence mechanism...
implementing-purdue-model-network-segmentation
When designing or retrofitting network architecture for an ICS/SCADA environment When implementing IEC 62443 zone and conduit requirements in a brownf...
performing-security-headers-audit
During authorized web application security assessments as a standard configuration review When evaluating browser-level protections against XSS, click...
intercepting-mobile-traffic-with-burpsuite
Use this skill when: Testing mobile application API endpoints for authentication, authorization, and injection vulnerabilities Analyzing data transmit...
detecting-cloud-threats-with-guardduty
When establishing continuous threat detection for new or existing AWS accounts When investigating GuardDuty findings related to compromised instances,...
deploying-palo-alto-prisma-access-zero-trust
When implementing enterprise-grade SASE with integrated ZTNA, SWG, CASB, and FWaaS When replacing both VPN and branch office firewalls with cloud-deli...
conducting-social-engineering-penetration-test
Social engineering penetration testing assesses an organization's human attack surface through controlled simulation of real-world deception technique...
implementing-image-provenance-verification-with-cosign
Cosign is a Sigstore tool for signing, verifying, and attaching metadata to container images and OCI artifacts. It supports both key-based and keyless...
implementing-network-segmentation-for-ot
When an OT security assessment reveals a flat network with no segmentation between Purdue levels When implementing IEC 62443 zone/conduit architecture...
analyzing-windows-registry-for-artifacts
When investigating user activity on a Windows system during an incident For identifying autorun/persistence mechanisms used by malware When tracing in...
implementing-syslog-centralization-with-rsyslog
When deploying or configuring implementing syslog centralization with rsyslog capabilities in your environment When establishing security controls ali...