Search Skills
Search across 54932 indexed skills
exploiting-vulnerabilities-with-metasploit-framework
The Metasploit Framework is the world's most widely used penetration testing platform, maintained by Rapid7. It contains over 2,300 exploits, 1,200 au...
performing-brand-monitoring-for-impersonation
Brand impersonation attacks exploit consumer trust through lookalike domains, fake social media profiles, counterfeit mobile apps, and phishing sites ...
performing-wireless-security-assessment-with-kismet
Kismet is an open-source wireless network detector, packet sniffer, and wireless intrusion detection system (WIDS) supporting 802.11a/b/g/n/ac/ax. Unl...
reverse-engineering-rust-malware
Rust has become increasingly popular for malware development due to its cross-compilation, memory safety guarantees, and the complexity it introduces ...
implementing-microsegmentation-with-guardicore
When implementing east-west traffic controls to prevent lateral movement within data centers When needing application-level visibility into network co...
exploiting-race-condition-vulnerabilities
When testing applications with transaction-based functionality (payments, transfers, coupons) During assessment of rate-limiting or attempt-limiting m...
conducting-cloud-penetration-testing
When performing authorized security assessments of cloud environments before production deployment When validating cloud security controls after a maj...
exploiting-broken-link-hijacking
When auditing web applications for references to expired or unclaimed external resources During supply chain security assessments of third-party scrip...
detecting-suspicious-powershell-execution
When proactively hunting for indicators of detecting suspicious powershell execution in the environment After threat intelligence indicates active cam...
deploying-edr-agent-with-crowdstrike
Use this skill when: Deploying CrowdStrike Falcon sensors to Windows, macOS, or Linux endpoints Configuring Falcon prevention and detection policies f...
implementing-anti-ransomware-group-policy
Hardening a Windows Active Directory environment against ransomware execution and propagation Implementing defense-in-depth by blocking ransomware exe...
triaging-security-incident-with-ir-playbook
New security alert received from SIEM, EDR, or other detection sources SOC analyst needs to determine if an alert is a true positive requiring respons...