Search Skills
Search across 54932 indexed skills
implementing-ebpf-security-monitoring
When deploying kernel-level runtime security monitoring on Linux hosts or Kubernetes clusters When you need sub-millisecond visibility into process ex...
deploying-tailscale-for-zero-trust-vpn
Tailscale is a zero trust mesh VPN built on WireGuard that creates encrypted peer-to-peer connections between devices without requiring traditional VP...
detecting-golden-ticket-attacks-in-kerberos-logs
When KRBTGT account hash may have been compromised via DCSync or NTDS.dit extraction When hunting for forged Kerberos tickets used for persistent doma...
prioritizing-vulnerabilities-with-cvss-scoring
The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum of Incident Response and Security Teams) ...
performing-dynamic-analysis-with-any-run
Interactive malware analysis is needed where the analyst must click dialogs, enter credentials, or navigate installer screens Rapid cloud-based sandbo...
performing-web-cache-poisoning-attack
During authorized penetration tests when the application uses CDN or reverse proxy caching (Cloudflare, Akamai, Varnish, Nginx) When assessing web app...
building-threat-feed-aggregation-with-misp
MISP is the leading open-source threat intelligence platform for collecting, storing, distributing, and sharing cybersecurity indicators and threat in...
performing-yara-rule-development-for-detection
YARA is the pattern matching swiss knife for malware researchers, enabling identification and classification of malware based on textual or binary pat...
detecting-azure-storage-account-misconfigurations
Azure Storage accounts are a frequent target for attackers due to misconfigured public access, long-lived SAS tokens, missing encryption, and outdated...
implementing-bgp-security-with-rpki
Resource Public Key Infrastructure (RPKI) provides cryptographic validation of BGP route origins to prevent route hijacking and accidental route leaks...
configuring-pfsense-firewall-rules
Deploying a perimeter or internal firewall to segment and protect network zones (DMZ, internal, guest, IoT) Creating granular access control rules to ...
executing-red-team-engagement-planning
Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operatio...