Search Skills
Search across 54932 indexed skills
configuring-certificate-authority-with-openssl
A Certificate Authority (CA) is the trust anchor in a PKI hierarchy, responsible for issuing, signing, and revoking digital certificates. This skill c...
securing-aws-iam-permissions
When onboarding new AWS accounts or workloads that require scoped IAM policies When IAM Access Analyzer reports overly permissive policies or unused p...
performing-ssrf-vulnerability-exploitation
When conducting security assessments that involve performing ssrf vulnerability exploitation When following incident response procedures for related s...
implementing-mtls-for-zero-trust-services
When deploying or configuring implementing mtls for zero trust services capabilities in your environment When establishing security controls aligned t...
implementing-privileged-access-workstation
A Privileged Access Workstation (PAW) is a hardened device dedicated to performing sensitive administrative tasks. This skill covers PAW design using ...
implementing-soar-automation-with-phantom
Use this skill when: SOC teams need to automate repetitive triage and enrichment tasks for high-volume alerts Manual response times exceed SLA require...
analyzing-malware-persistence-with-autoruns
Sysinternals Autoruns extracts data from hundreds of Auto-Start Extensibility Points (ASEPs) on Windows, scanning 18+ categories including Run/RunOnce...
performing-csrf-attack-simulation
During authorized web application penetration tests to identify state-changing actions vulnerable to CSRF When testing the effectiveness of anti-CSRF ...
performing-log-analysis-for-forensic-investigation
When reconstructing the timeline of a security incident from available log sources During post-breach investigation to identify initial access, latera...
executing-phishing-simulation-campaign
Measuring employee susceptibility to phishing attacks as part of a security awareness program Testing the effectiveness of email security controls (se...
analyzing-certificate-transparency-for-phishing
Certificate Transparency (CT) is an Internet security standard that creates a public, append-only log of all issued SSL/TLS certificates. Monitoring C...
detecting-rdp-brute-force-attacks
RDP brute force attacks target Windows Remote Desktop Protocol services by attempting rapid credential guessing against exposed RDP endpoints. Detecti...