Skip to main content

Database

Browse 4,557 skills across 394 packs and 37 categories

Showing 1561–1620 of 1,708 skills
1,708 skills found in Technology & Engineering

schema-validation

155L

API schema validation testing, fuzzing, and type confusion attacks

Technology & EngineeringApi Security Agent

third-party-connectors

138L

Third-party API integration risk assessment and supply chain security testing

Technology & EngineeringApi Security Agent

token-handling

126L

JWT/OAuth token analysis, validation, and expiry testing for API security assessments

Technology & EngineeringApi Security Agent

webhook-security

146L

Webhook trust boundary testing, signature verification, and callback security

Technology & EngineeringApi Security Agent

aws-posture

153L

AWS security posture review including S3 exposure, IAM policies, and CloudTrail for authorized assessments

Technology & EngineeringCloud Security Agent

azure-posture

150L

Azure security assessment including Entra ID, NSGs, and Key Vault for authorized security assessments

Technology & EngineeringCloud Security Agent

cloud-logging-monitoring

150L

CloudTrail, Azure Monitor, and GCP logging coverage gap assessment for authorized security assessments

Technology & EngineeringCloud Security Agent

cloud-network-policy

152L

VPC rules, security groups, and cloud network segmentation assessment for authorized security assessments

Technology & EngineeringCloud Security Agent

cloud-storage-exposure

167L

Public bucket and blob detection, storage ACL review for authorized security assessments

Technology & EngineeringCloud Security Agent

gcp-posture

158L

GCP security review including service accounts, storage, and VPC for authorized security assessments

Technology & EngineeringCloud Security Agent

alert-quality

162L

Alert quality review, noise reduction, and detection tuning methodology

Technology & EngineeringDetection Logging Agent

detection-engineering

223L

Detection rule writing, SIGMA/YARA rule development, and behavioral detection

Technology & EngineeringDetection Logging Agent

forensic-readiness

140L

Forensic log retention assessment, evidence preservation, and attack traceability

Technology & EngineeringDetection Logging Agent

incident-response

204L

IR handoff quality assessment, playbook review, and communication evaluation

Technology & EngineeringDetection Logging Agent

siem-coverage

144L

SIEM coverage assessment, log source gaps, and detection blind spot analysis

Technology & EngineeringDetection Logging Agent

threat-hunting

186L

Proactive threat hunting methodology with hypothesis-driven search techniques

Technology & EngineeringDetection Logging Agent

container-security

157L

Container image hygiene, Kubernetes RBAC, and pod security assessment

Technology & EngineeringEndpoint Agent

edr-visibility

127L

EDR and antivirus coverage gap analysis and blind spot detection

Technology & EngineeringEndpoint Agent

local-privilege

147L

Local privilege escalation testing including SUID, sudo abuse, and service misconfiguration

Technology & EngineeringEndpoint Agent

os-hardening

144L

OS hardening assessment for Linux and Windows systems against CIS benchmarks

Technology & EngineeringEndpoint Agent

scheduled-task-abuse

161L

Cron job and scheduled task abuse risk assessment and service hijacking

Technology & EngineeringEndpoint Agent

software-inventory

143L

Software inventory anomaly detection, shadow IT discovery, and EOL software identification

Technology & EngineeringEndpoint Agent

exploitability-confirmation

136L

Exploitability confirmation and false positive reduction methodology

Technology & EngineeringExploit Validation Agent

impact-verification

144L

Impact verification, blast radius estimation, and business consequence assessment

Technology & EngineeringExploit Validation Agent

poc-execution

140L

Controlled proof-of-concept execution and safe vulnerability validation

Technology & EngineeringExploit Validation Agent

post-exploitation-mapping

157L

Post-exploitation risk mapping including pivot paths and persistence mechanisms

Technology & EngineeringExploit Validation Agent

vulnerability-assessment

165L

CVE matching, version risk analysis, and misconfiguration detection methodology

Technology & EngineeringExploit Validation Agent

ad-security

157L

Active Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments

Technology & EngineeringIdentity Iam Agent

iam-policy-review

164L

IAM policy analysis and least privilege assessment for authorized security assessments

Technology & EngineeringIdentity Iam Agent

mfa-coverage

155L

MFA coverage assessment and bypass risk detection for authorized security assessments

Technology & EngineeringIdentity Iam Agent

privilege-escalation

168L

Privilege escalation path detection in cloud and enterprise environments for authorized assessments

Technology & EngineeringIdentity Iam Agent

role-trust-boundaries

157L

Role trust boundaries, cross-account access, and federation security review for authorized assessments

Technology & EngineeringIdentity Iam Agent

secret-management

163L

Secret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments

Technology & EngineeringIdentity Iam Agent

attribution-support

48L

Alias clustering, language patterns, infrastructure reuse, and confidence-rated attribution

Technology & EngineeringInfrastructure Correlation

decentralized-threat-research

46L

P2P abuse monitoring, wallet-linked fraud, smart contract risk, and cross-platform correlation

Technology & EngineeringInfrastructure Correlation

domain-correlation

47L

Correlate domains, certificates, IPs, and ASNs across adversary campaigns

Technology & EngineeringInfrastructure Correlation

incident-enrichment

48L

Transform raw security alerts into actor hypotheses, motives, next steps, and containment guidance

Technology & EngineeringInfrastructure Correlation

osint-fusion

49L

Merge public web, breach data, passive DNS, social graph, and code repository intelligence

Technology & EngineeringInfrastructure Correlation

endpoint-visibility

130L

Endpoint visibility gap analysis, rogue device detection, and EDR coverage assessment for internal networks

Technology & EngineeringInternal Network Agent

lateral-movement

118L

Lateral movement path analysis, credential relay, and pivot detection for authorized internal network assessments

Technology & EngineeringInternal Network Agent

legacy-protocol-risk

121L

Legacy protocol risk assessment for SMBv1, LLMNR, NetBIOS, Telnet, and other deprecated services

Technology & EngineeringInternal Network Agent

segmentation-review

134L

Network segmentation validation, VLAN hopping, firewall rule review, and micro-segmentation testing

Technology & EngineeringInternal Network Agent

trust-relationships

111L

Domain trust enumeration, shared service abuse, and cross-boundary attack path analysis for authorized assessments

Technology & EngineeringInternal Network Agent

app-transport

155L

App transport security assessment, certificate pinning validation, HSTS enforcement, and TLS configuration review

Technology & EngineeringMobile Client Security

local-storage

158L

Mobile local storage security review, keychain/keystore assessment, and sensitive data exposure detection

Technology & EngineeringMobile Client Security

mobile-api-testing

185L

Mobile API interception, proxy configuration, request manipulation, and backend API security testing

Technology & EngineeringMobile Client Security

reverse-engineering

165L

APK and IPA decompilation, binary analysis, obfuscation review, and tampering detection assessment

Technology & EngineeringMobile Client Security

token-persistence

162L

Mobile token persistence analysis, session management review, and authentication state security

Technology & EngineeringMobile Client Security

host-discovery

124L

Host availability detection and network segmentation mapping for authorized security assessments

Technology & EngineeringNetwork Mapper Agent

network-exposure

138L

Exposure validation and firewall rule assessment for authorized security assessments

Technology & EngineeringNetwork Mapper Agent

port-scanning

124L

Port discovery and service detection with nmap for authorized security assessments

Technology & EngineeringNetwork Mapper Agent

protocol-identification

141L

Protocol fingerprinting and unusual service detection for authorized security assessments

Technology & EngineeringNetwork Mapper Agent

traffic-analysis

145L

Packet capture interpretation, cleartext detection, and traffic analysis with tcpdump and Wireshark

Technology & EngineeringNetwork Mapper Agent

tunneling-validation

140L

Secure tunneling validation, proxy path review, and VPN configuration checks for authorized assessments

Technology & EngineeringNetwork Mapper Agent

credential-attacks

45L

Credential attack techniques for authorized assessments including password spraying, Kerberoasting, NTLM relay, and credential dumping

Technology & EngineeringPentest Exploitation

defense-evasion-testing

45L

Testing detection coverage through AMSI bypass, process injection, and living-off-the-land techniques for detection validation

Technology & EngineeringPentest Exploitation

initial-access

45L

Initial access techniques for authorized penetration tests including phishing, exposed services, and credential attacks

Technology & EngineeringPentest Exploitation

lateral-movement-techniques

45L

Lateral movement techniques for authorized assessments including pass-the-hash, WMI, PSExec, and RDP pivoting

Technology & EngineeringPentest Exploitation

payload-development

46L

Custom payload development for authorized assessments including AV/EDR testing and C2 framework usage

Technology & EngineeringPentest Exploitation

persistence-analysis

46L

Persistence mechanism testing for authorized assessments covering scheduled tasks, registry keys, services, and DLL side-loading

Technology & EngineeringPentest Exploitation