Database
Browse 5,877 skills across 396 packs and 37 categories
credential-attacks
45LCredential attack techniques for authorized assessments including password spraying, Kerberoasting, NTLM relay, and credential dumping
defense-evasion-testing
45LTesting detection coverage through AMSI bypass, process injection, and living-off-the-land techniques for detection validation
initial-access
45LInitial access techniques for authorized penetration tests including phishing, exposed services, and credential attacks
lateral-movement-techniques
45LLateral movement techniques for authorized assessments including pass-the-hash, WMI, PSExec, and RDP pivoting
payload-development
46LCustom payload development for authorized assessments including AV/EDR testing and C2 framework usage
persistence-analysis
46LPersistence mechanism testing for authorized assessments covering scheduled tasks, registry keys, services, and DLL side-loading
privilege-escalation-techniques
46LWindows and Linux privilege escalation techniques for authorized penetration testing including kernel exploits, misconfigurations, and token abuse