Found 1000 skills for "database" Page 75 of 84

replit-common-errors

Quick reference for the 10 most common Replit errors with real solutions. Covers container lifecycle, Nix configuration, database, deployment, and net...

github 1 files

android-coroutines

This skill provides authoritative rules and patterns for writing production-quality Kotlin Coroutines code on Android. It enforces structured concurre...

github 1 files

performing-user-behavior-analytics

Use this skill when: SOC teams need to detect compromised accounts through abnormal authentication patterns Insider threat programs require behavioral...

github 4 files

notion-spec-to-implementation

Convert a Notion spec into linked implementation plans, tasks, and ongoing status updates. 1) Locate the spec with Notion:notion-search, then fetch it...

github 19 files

performing-vulnerability-scanning-with-nessus

Conducting initial vulnerability assessment during the reconnaissance phase of a penetration test Performing periodic vulnerability scans to maintain ...

github 4 files

performing-asset-criticality-scoring-for-vulns

Asset criticality scoring assigns a business impact rating to each IT asset so that vulnerability remediation efforts focus on systems with the greate...

github 8 files

performing-graphql-depth-limit-attack

GraphQL depth limit attacks exploit the recursive nature of GraphQL schemas to craft deeply nested queries that consume excessive server resources, le...

github 4 files

implementing-privileged-session-monitoring

Deploying or configuring session recording for all privileged access to critical servers and databases Meeting compliance requirements (PCI-DSS 10.2, ...

github 4 files

detecting-misconfigured-azure-storage

When performing a security audit of Azure Storage accounts across subscriptions When responding to Microsoft Defender for Storage alerts about anonymo...

github 4 files

implementing-file-integrity-monitoring-with-aide

AIDE (Advanced Intrusion Detection Environment) is a host-based intrusion detection system that monitors file and directory integrity using cryptograp...

github 4 files

extracting-browser-history-artifacts

When investigating user web activity as part of a forensic examination During insider threat investigations to establish patterns of data exfiltration...

github 4 files

exploiting-sql-injection-vulnerabilities

Testing web application input parameters for SQL injection vulnerabilities during an authorized penetration test Validating that parameterized queries...

github 4 files