Database
Browse 5,877 skills across 396 packs and 37 categories
business-email-compromise
55LSimulate BEC attacks to test financial controls, authorization procedures, and executive impersonation defenses
credential-harvesting
57LBuild authorized credential harvesting pages for phishing simulations using GoPhish, Evilginx, and transparent proxies
deepfake-awareness
55LBuild organizational awareness and verification procedures against deepfake voice, video, and AI-generated content threats
helpdesk-exploitation
55LTest helpdesk and IT support social engineering resilience through authorized identity verification bypass assessments
insider-threat-assessment
55LAssess insider threat program maturity through gap analysis of behavioral indicators, DLP, and access controls
red-team-social-engineering
58LExecute full-scope red team social engineering campaigns combining email, phone, physical, and technical vectors
social-media-reconnaissance
55LConduct social media OSINT for authorized engagements to map organizational exposure and employee data leakage
supply-chain-social-engineering
55LAssess supply chain and third-party social engineering risks through vendor impersonation and trusted relationship abuse testing