Search Skills
Search across 54932 indexed skills
implementing-api-security-posture-management
API Security Posture Management (API-SPM) provides continuous visibility into an organization's API attack surface by automatically discovering, class...
implementing-iso-27001-information-security-management
ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Manage...
performing-web-application-penetration-test
Testing web applications before production deployment to identify exploitable vulnerabilities Conducting compliance-driven security assessments (PCI-D...
performing-deception-technology-deployment
Use this skill when: SOC teams need high-fidelity detection of post-compromise lateral movement with near-zero false positives Existing detection tool...
analyzing-heap-spray-exploitation
Heap spraying is an exploitation technique that fills large regions of a process's heap with attacker-controlled data (typically NOP sleds followed by...
analyzing-kubernetes-audit-logs
When investigating security incidents that require analyzing kubernetes audit logs When building detection rules or threat hunting queries for this do...
detecting-wmi-persistence
When hunting for WMI event subscription persistence (MITRE ATT&CK T1546.003) After detecting suspicious WMI activity in endpoint telemetry During inci...
performing-service-account-audit
Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant accounts. This skill covers discovery...
performing-ot-vulnerability-assessment-with-claroty
When conducting scheduled OT vulnerability assessments per IEC 62443 or NERC CIP requirements When deploying Claroty xDome for the first time and perf...
performing-cloud-storage-forensic-acquisition
Cloud storage forensic acquisition involves collecting digital evidence from services like Google Drive, OneDrive, Dropbox, and Box through both API-b...
testing-android-intents-for-vulnerabilities
Use this skill when: Assessing Android app exported activities, services, receivers, and content providers Testing for intent injection and unauthoriz...
performing-ssl-tls-security-assessment
Assess SSL/TLS server configurations using sslyze, a fast Python-based scanning library. This skill covers evaluating supported protocol versions (SSL...