Search Skills
Search across 54932 indexed skills
breakdown-feature-implementation
Act as an industry-veteran software engineer responsible for crafting high-touch features for large-scale SaaS companies. Excel at creating detailed t...
testing-for-sensitive-data-exposure
During authorized penetration tests when assessing data protection controls When evaluating applications for GDPR, PCI DSS, HIPAA, or other data prote...
performing-red-team-with-covenant
Covenant is a collaborative .NET C2 framework for red teamers that provides a Swagger-documented REST API for managing listeners, launchers, grunts (a...
performing-timeline-reconstruction-with-plaso
When building a comprehensive forensic timeline from multiple evidence sources For correlating events across file system metadata, event logs, browser...
implementing-supply-chain-security-with-in-toto
in-toto is a CNCF graduated project that ensures the integrity of software supply chains from initiation to end-user installation. It creates a verifi...
implementing-taxii-server-with-opentaxii
TAXII (Trusted Automated eXchange of Intelligence Information) is an OASIS standard protocol for exchanging cyber threat intelligence over HTTPS. Open...
implementing-rapid7-insightvm-for-scanning
Rapid7 InsightVM (formerly Nexpose) is an enterprise vulnerability management platform that combines on-premises scanning via Security Console and Sca...
implementing-devsecops-security-scanning
Setting up automated security scanning in a new or existing CI/CD pipeline Shifting security left by catching vulnerabilities before code reaches prod...
implementing-gcp-binary-authorization
Binary Authorization is a Google Cloud deploy-time security control that ensures only trusted container images are deployed on GKE or Cloud Run. It wo...
performing-cloud-native-forensics-with-falco
When conducting security assessments that involve performing cloud native forensics with falco When following incident response procedures for related...
performing-active-directory-bloodhound-analysis
BloodHound is an open-source Active Directory reconnaissance tool that uses graph theory to reveal hidden relationships, attack paths, and privilege e...
implementing-aqua-security-for-container-scanning
Aqua Security provides Trivy, the world's most popular open-source universal security scanner, designed to find vulnerabilities, misconfigurations, se...