Search Skills
Search across 54932 indexed skills
analyzing-mft-for-deleted-file-recovery
The NTFS Master File Table ($MFT) is the central metadata repository for every file and directory on an NTFS volume. Each file is represented by at le...
implementing-sigstore-for-software-signing
Signing container images and software artifacts without managing long-lived cryptographic keys Establishing verifiable provenance for build outputs in...
analyzing-sbom-for-supply-chain-vulnerabilities
A new regulatory requirement (EO 14028, EU CRA) mandates SBOM analysis for software deliveries Security team needs to assess third-party risk by scann...
implementing-vulnerability-remediation-sla
Vulnerability remediation SLAs define mandatory timeframes for patching or mitigating identified vulnerabilities based on severity, asset criticality,...
implementing-usb-device-control-policy
Use this skill when: Restricting USB storage devices to prevent data exfiltration or malware introduction Implementing device control policies via GPO...
detecting-process-injection-techniques
EDR alerts on suspicious API call sequences (VirtualAllocEx + WriteProcessMemory + CreateRemoteThread) A legitimate process (explorer.exe, svchost.exe...
performing-content-security-policy-bypass
When XSS is found but execution is blocked by Content Security Policy During web application security assessments to evaluate CSP effectiveness When t...
implementing-azure-ad-privileged-identity-management
Microsoft Entra Privileged Identity Management (PIM) provides time-based and approval-based role activation to mitigate risks from excessive, unnecess...
detecting-modbus-protocol-anomalies
When deploying Modbus-specific intrusion detection in an OT environment When building baseline models for deterministic Modbus polling patterns When i...
generating-threat-intelligence-reports
Use this skill when: Producing weekly, monthly, or quarterly threat intelligence summaries for security leadership Creating a rapid intelligence asses...
testing-for-business-logic-vulnerabilities
During authorized penetration tests when automated scanners have found few technical vulnerabilities When assessing e-commerce platforms for pricing, ...
performing-hardware-security-module-integration
Hardware Security Modules (HSMs) provide tamper-resistant cryptographic key storage and operations. This skill covers integrating with HSMs via the PK...