Search Skills
Search across 54932 indexed skills
implementing-gcp-organization-policy-constraints
The GCP Organization Policy Service provides centralized and programmatic control over cloud resources. Organization policies configure constraints th...
performing-kubernetes-penetration-testing
Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against the API server, kubelet, etcd, pods...
implementing-gcp-binary-authorization
Binary Authorization is a Google Cloud deploy-time security control that ensures only trusted container images are deployed on GKE or Cloud Run. It wo...
detecting-ntlm-relay-with-event-correlation
Authorized Testing Disclaimer: The offensive techniques and attack simulations described in this skill are intended exclusively for authorized penetra...
detecting-network-anomalies-with-zeek
Deploying passive network security monitoring at key network choke points for continuous visibility Generating structured connection, DNS, HTTP, SSL, ...
implementing-passwordless-authentication-with-fido2
Deploy FIDO2/WebAuthn passwordless authentication using security keys and platform authenticators. Covers WebAuthn API integration, FIDO2 server confi...
performing-kubernetes-cis-benchmark-with-kube-bench
kube-bench is an open-source Go tool by Aqua Security that runs the CIS Kubernetes Benchmark checks. It verifies control plane, etcd, worker node, and...
implementing-cloud-trail-log-analysis
When building security monitoring pipelines for AWS API activity When investigating security incidents to trace attacker actions across AWS services W...
auditing-cloud-with-cis-benchmarks
When performing initial security audits of cloud environments against industry-standard benchmarks When preparing for SOC 2, ISO 27001, or regulatory ...
detecting-bluetooth-low-energy-attacks
This skill is intended for authorized security testing, penetration testing engagements, CTF competitions, and educational purposes only. Sniffing, in...
detecting-rdp-brute-force-attacks
RDP brute force attacks target Windows Remote Desktop Protocol services by attempting rapid credential guessing against exposed RDP endpoints. Detecti...
implementing-network-segmentation-with-firewall-zones
Network segmentation divides a flat network into isolated security zones with firewall-enforced boundaries to contain breaches, restrict lateral movem...