Search Skills
Search across 54932 indexed skills
exploiting-api-injection-vulnerabilities
Testing API endpoints that accept user input for database queries, system commands, or external requests Assessing APIs that interact with SQL databas...
performing-indicator-lifecycle-management
Indicator lifecycle management tracks IOCs from initial discovery through validation, enrichment, deployment, monitoring, and eventual retirement. Thi...
recovering-deleted-files-with-photorec
When recovering deleted files from a forensic disk image or storage device When the file system is corrupted, formatted, or overwritten During investi...
performing-cloud-asset-inventory-with-cartography
Cartography is a CNCF sandbox project (originally created at Lyft) that consolidates infrastructure assets and their relationships into a Neo4j graph ...
performing-paste-site-monitoring-for-credentials
Paste sites (Pastebin, GitHub Gists, Ghostbin, Dpaste, Hastebin) are frequently used as staging areas for leaked credentials, database dumps, API keys...
securing-azure-with-microsoft-defender
When deploying cloud workload protection across Azure subscriptions and resource groups When establishing a Secure Score baseline and prioritizing sec...
analyzing-windows-amcache-artifacts
Determining which programs have existed or executed on a Windows system during incident response Correlating SHA-1 hashes from Amcache against known m...
analyzing-disk-image-with-autopsy
When you have a forensic disk image and need structured analysis of its contents During investigations requiring file recovery, keyword searching, and...
conducting-external-reconnaissance-with-osint
Performing the initial reconnaissance phase of a penetration test to gather intelligence before active scanning Mapping an organization's external att...
analyzing-browser-forensics-with-hindsight
Hindsight is an open-source browser forensics tool designed to parse artifacts from Google Chrome and other Chromium-based browsers (Microsoft Edge, B...
analyzing-tls-certificate-transparency-logs
When investigating security incidents that require analyzing tls certificate transparency logs When building detection rules or threat hunting queries...
recovering-from-ransomware-attack
After ransomware has encrypted production systems and the decision has been made to recover from backups When building or validating a ransomware reco...