Database
Browse 4,557 skills across 394 packs and 37 categories
schema-validation
155LAPI schema validation testing, fuzzing, and type confusion attacks
third-party-connectors
138LThird-party API integration risk assessment and supply chain security testing
token-handling
126LJWT/OAuth token analysis, validation, and expiry testing for API security assessments
webhook-security
146LWebhook trust boundary testing, signature verification, and callback security
aws-posture
153LAWS security posture review including S3 exposure, IAM policies, and CloudTrail for authorized assessments
azure-posture
150LAzure security assessment including Entra ID, NSGs, and Key Vault for authorized security assessments
cloud-logging-monitoring
150LCloudTrail, Azure Monitor, and GCP logging coverage gap assessment for authorized security assessments
cloud-network-policy
152LVPC rules, security groups, and cloud network segmentation assessment for authorized security assessments
cloud-storage-exposure
167LPublic bucket and blob detection, storage ACL review for authorized security assessments
gcp-posture
158LGCP security review including service accounts, storage, and VPC for authorized security assessments
alert-quality
162LAlert quality review, noise reduction, and detection tuning methodology
detection-engineering
223LDetection rule writing, SIGMA/YARA rule development, and behavioral detection
forensic-readiness
140LForensic log retention assessment, evidence preservation, and attack traceability
incident-response
204LIR handoff quality assessment, playbook review, and communication evaluation
siem-coverage
144LSIEM coverage assessment, log source gaps, and detection blind spot analysis
threat-hunting
186LProactive threat hunting methodology with hypothesis-driven search techniques
container-security
157LContainer image hygiene, Kubernetes RBAC, and pod security assessment
edr-visibility
127LEDR and antivirus coverage gap analysis and blind spot detection
local-privilege
147LLocal privilege escalation testing including SUID, sudo abuse, and service misconfiguration
os-hardening
144LOS hardening assessment for Linux and Windows systems against CIS benchmarks
scheduled-task-abuse
161LCron job and scheduled task abuse risk assessment and service hijacking
software-inventory
143LSoftware inventory anomaly detection, shadow IT discovery, and EOL software identification
exploitability-confirmation
136LExploitability confirmation and false positive reduction methodology
impact-verification
144LImpact verification, blast radius estimation, and business consequence assessment
poc-execution
140LControlled proof-of-concept execution and safe vulnerability validation
post-exploitation-mapping
157LPost-exploitation risk mapping including pivot paths and persistence mechanisms
vulnerability-assessment
165LCVE matching, version risk analysis, and misconfiguration detection methodology
ad-security
157LActive Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments
iam-policy-review
164LIAM policy analysis and least privilege assessment for authorized security assessments
mfa-coverage
155LMFA coverage assessment and bypass risk detection for authorized security assessments
privilege-escalation
168LPrivilege escalation path detection in cloud and enterprise environments for authorized assessments
role-trust-boundaries
157LRole trust boundaries, cross-account access, and federation security review for authorized assessments
secret-management
163LSecret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments
attribution-support
48LAlias clustering, language patterns, infrastructure reuse, and confidence-rated attribution
decentralized-threat-research
46LP2P abuse monitoring, wallet-linked fraud, smart contract risk, and cross-platform correlation
domain-correlation
47LCorrelate domains, certificates, IPs, and ASNs across adversary campaigns
incident-enrichment
48LTransform raw security alerts into actor hypotheses, motives, next steps, and containment guidance
osint-fusion
49LMerge public web, breach data, passive DNS, social graph, and code repository intelligence
endpoint-visibility
130LEndpoint visibility gap analysis, rogue device detection, and EDR coverage assessment for internal networks
lateral-movement
118LLateral movement path analysis, credential relay, and pivot detection for authorized internal network assessments
legacy-protocol-risk
121LLegacy protocol risk assessment for SMBv1, LLMNR, NetBIOS, Telnet, and other deprecated services
segmentation-review
134LNetwork segmentation validation, VLAN hopping, firewall rule review, and micro-segmentation testing
trust-relationships
111LDomain trust enumeration, shared service abuse, and cross-boundary attack path analysis for authorized assessments
app-transport
155LApp transport security assessment, certificate pinning validation, HSTS enforcement, and TLS configuration review
local-storage
158LMobile local storage security review, keychain/keystore assessment, and sensitive data exposure detection
mobile-api-testing
185LMobile API interception, proxy configuration, request manipulation, and backend API security testing
reverse-engineering
165LAPK and IPA decompilation, binary analysis, obfuscation review, and tampering detection assessment
token-persistence
162LMobile token persistence analysis, session management review, and authentication state security
host-discovery
124LHost availability detection and network segmentation mapping for authorized security assessments
network-exposure
138LExposure validation and firewall rule assessment for authorized security assessments
port-scanning
124LPort discovery and service detection with nmap for authorized security assessments
protocol-identification
141LProtocol fingerprinting and unusual service detection for authorized security assessments
traffic-analysis
145LPacket capture interpretation, cleartext detection, and traffic analysis with tcpdump and Wireshark
tunneling-validation
140LSecure tunneling validation, proxy path review, and VPN configuration checks for authorized assessments
credential-attacks
45LCredential attack techniques for authorized assessments including password spraying, Kerberoasting, NTLM relay, and credential dumping
defense-evasion-testing
45LTesting detection coverage through AMSI bypass, process injection, and living-off-the-land techniques for detection validation
initial-access
45LInitial access techniques for authorized penetration tests including phishing, exposed services, and credential attacks
lateral-movement-techniques
45LLateral movement techniques for authorized assessments including pass-the-hash, WMI, PSExec, and RDP pivoting
payload-development
46LCustom payload development for authorized assessments including AV/EDR testing and C2 framework usage
persistence-analysis
46LPersistence mechanism testing for authorized assessments covering scheduled tasks, registry keys, services, and DLL side-loading