Search Skills
Search across 54932 indexed skills
performing-web-cache-deception-attack
When testing applications behind CDNs or reverse proxies (Cloudflare, Akamai, Varnish, Nginx) During assessment of authenticated page caching behavior...
implementing-deception-based-detection-with-canarytoken
Canary Tokens are lightweight tripwire mechanisms that alert when an attacker accesses a resource. This skill uses the Thinkst Canary REST API to prog...
exploiting-constrained-delegation-abuse
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...
analyzing-prefetch-files-for-execution-history
When determining which programs were executed on a Windows system and when During malware investigations to confirm execution of suspicious binaries F...
exploiting-insecure-data-storage-in-mobile
Use this skill when: Assessing whether mobile applications store sensitive data securely on the device filesystem Testing for credential leakage throu...
performing-privileged-account-access-review
Privileged Account Access Review is a critical identity governance process that validates whether users with elevated permissions still require their ...
implementing-infrastructure-as-code-security-scanning
When provisioning cloud infrastructure with Terraform, CloudFormation, or Pulumi and needing automated security validation When compliance frameworks ...
implementing-api-gateway-security-controls
Deploying a centralized authentication and authorization layer for microservice APIs Implementing rate limiting, throttling, and quota management acro...
implementing-nerc-cip-compliance-controls
When a registered entity must achieve or maintain NERC CIP compliance for BES cyber systems When preparing for a NERC CIP compliance audit by the Regi...
analyzing-threat-actor-ttps-with-mitre-navigator
The MITRE ATT&CK Navigator is a web application for annotating and visualizing ATT&CK matrices. Combined with the attackcti Python library (which quer...
testing-jwt-token-security
During authorized penetration tests when the application uses JWT for authentication or authorization When assessing API security where JWTs are passe...
detecting-service-account-abuse
When proactively hunting for indicators of detecting service account abuse in the environment After threat intelligence indicates active campaigns usi...