Found 1000 skills for "database" Page 76 of 84

exploiting-api-injection-vulnerabilities

Testing API endpoints that accept user input for database queries, system commands, or external requests Assessing APIs that interact with SQL databas...

github 4 files

performing-indicator-lifecycle-management

Indicator lifecycle management tracks IOCs from initial discovery through validation, enrichment, deployment, monitoring, and eventual retirement. Thi...

github 8 files

recovering-deleted-files-with-photorec

When recovering deleted files from a forensic disk image or storage device When the file system is corrupted, formatted, or overwritten During investi...

github 4 files

performing-cloud-asset-inventory-with-cartography

Cartography is a CNCF sandbox project (originally created at Lyft) that consolidates infrastructure assets and their relationships into a Neo4j graph ...

github 8 files

performing-paste-site-monitoring-for-credentials

Paste sites (Pastebin, GitHub Gists, Ghostbin, Dpaste, Hastebin) are frequently used as staging areas for leaked credentials, database dumps, API keys...

github 4 files

securing-azure-with-microsoft-defender

When deploying cloud workload protection across Azure subscriptions and resource groups When establishing a Secure Score baseline and prioritizing sec...

github 4 files

analyzing-windows-amcache-artifacts

Determining which programs have existed or executed on a Windows system during incident response Correlating SHA-1 hashes from Amcache against known m...

github 4 files

analyzing-disk-image-with-autopsy

When you have a forensic disk image and need structured analysis of its contents During investigations requiring file recovery, keyword searching, and...

github 4 files

conducting-external-reconnaissance-with-osint

Performing the initial reconnaissance phase of a penetration test to gather intelligence before active scanning Mapping an organization's external att...

github 4 files

analyzing-browser-forensics-with-hindsight

Hindsight is an open-source browser forensics tool designed to parse artifacts from Google Chrome and other Chromium-based browsers (Microsoft Edge, B...

github 8 files

analyzing-tls-certificate-transparency-logs

When investigating security incidents that require analyzing tls certificate transparency logs When building detection rules or threat hunting queries...

github 4 files

recovering-from-ransomware-attack

After ransomware has encrypted production systems and the decision has been made to recover from backups When building or validating a ransomware reco...

github 7 files