Skip to main content

Database

Browse 4,557 skills across 394 packs and 37 categories

Showing 1621–1680 of 1,708 skills
1,708 skills found in Technology & Engineering

privilege-escalation-techniques

46L

Windows and Linux privilege escalation techniques for authorized penetration testing including kernel exploits, misconfigurations, and token abuse

Technology & EngineeringPentest Exploitation

ad-attack-paths

46L

Active Directory attack path analysis using BloodHound, Certify, and Rubeus for authorized security assessments

Technology & EngineeringPentest Infrastructure

attack-infrastructure

45L

Attack infrastructure setup including redirectors, domain fronting assessment, and phishing infrastructure for authorized engagements

Technology & EngineeringPentest Infrastructure

c2-framework

45L

Command and control framework setup and operation for authorized penetration tests with OPSEC considerations

Technology & EngineeringPentest Infrastructure

cloud-exploitation

45L

Cloud exploitation techniques for authorized assessments covering metadata abuse, SSRF to cloud, and IAM role assumption

Technology & EngineeringPentest Infrastructure

debrief-retesting

47L

Client debrief methodology, remediation validation, retest procedures, and knowledge transfer for penetration testing engagements

Technology & EngineeringPentest Infrastructure

report-writing

46L

Professional penetration test report writing covering executive summary, technical findings, risk ratings, and remediation guidance

Technology & EngineeringPentest Infrastructure

engagement-planning

48L

Rules of engagement definition, scope documentation, authorization validation, and legal compliance for penetration testing

Technology & EngineeringPentest Methodology

external-pentest

46L

External network penetration testing methodology aligned with PTES for authorized security assessments

Technology & EngineeringPentest Methodology

internal-pentest

45L

Internal network penetration testing and assumed breach methodology for authorized security assessments

Technology & EngineeringPentest Methodology

physical-pentest

45L

Physical penetration testing methodology including access control bypass, tailgating assessment, and social engineering for authorized engagements

Technology & EngineeringPentest Methodology

purple-team

45L

Purple team exercise methodology for cooperative adversary simulation and detection validation in authorized engagements

Technology & EngineeringPentest Methodology

red-team-operations

45L

Red team engagement methodology covering objective-based adversary simulation and stealth assessment for authorized operations

Technology & EngineeringPentest Methodology

web-app-pentest

47L

Web application penetration testing aligned with the OWASP Testing Guide for authorized security assessments

Technology & EngineeringPentest Methodology

wireless-pentest

45L

Wireless network penetration testing covering WPA/WPA2/WPA3 assessment and rogue access point detection for authorized engagements

Technology & EngineeringPentest Methodology

asn-ip-mapping

102L

ASN/IP range awareness, WHOIS lookups, and BGP route analysis for authorized security assessments

Technology & EngineeringRecon Agent

asset-discovery

99L

Asset discovery, DNS enumeration, and subdomain mapping for authorized security assessments

Technology & EngineeringRecon Agent

attack-surface-mapping

129L

External attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments

Technology & EngineeringRecon Agent

certificate-analysis

131L

Certificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments

Technology & EngineeringRecon Agent

osint-gathering

119L

Open source intelligence collection, data leak checks, and metadata extraction for authorized assessments

Technology & EngineeringRecon Agent

service-inventory

114L

Service inventory and technology fingerprinting for authorized security assessments

Technology & EngineeringRecon Agent

compliance-mapping

172L

Compliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA

Technology & EngineeringReporting Agent

executive-summary

182L

Executive summary writing and non-technical security communication

Technology & EngineeringReporting Agent

findings-documentation

177L

Clear vulnerability findings documentation with reproducible steps and evidence handling

Technology & EngineeringReporting Agent

remediation-mapping

198L

Remediation mapping, fix prioritization, and timeline estimation

Technology & EngineeringReporting Agent

severity-scoring

186L

CVSS scoring, risk rating methodology, and business impact assessment

Technology & EngineeringReporting Agent

change-safety

180L

Change safety guardrails for security testing, do-not-touch asset protection, and rollback planning

Technology & EngineeringSafety Scope Guard

legal-authorization

170L

Legal authorization verification, rules of engagement compliance, and regulatory awareness for security testing

Technology & EngineeringSafety Scope Guard

proof-only-mode

153L

Non-destructive vulnerability validation, proof-of-concept without exploitation, and safe evidence collection

Technology & EngineeringSafety Scope Guard

rate-limiting-safety

153L

Safe testing rate limits, resource-aware scanning, and production disruption avoidance

Technology & EngineeringSafety Scope Guard

scope-enforcement

149L

Scope enforcement for penetration testing, authorized target validation, and boundary compliance

Technology & EngineeringSafety Scope Guard

awareness-gaps

193L

Security awareness gap assessment, training effectiveness measurement, and human risk quantification

Technology & EngineeringSocial Engineering Readiness

helpdesk-abuse

191L

Helpdesk abuse path identification, pretexting scenarios, and identity verification bypass testing

Technology & EngineeringSocial Engineering Readiness

phishing-simulation

176L

Phishing simulation campaign planning, pretext development, payload design, and metrics collection

Technology & EngineeringSocial Engineering Readiness

physical-security

211L

Physical security assessment, tailgating testing, badge cloning awareness, and facility access review

Technology & EngineeringSocial Engineering Readiness

process-weakness

185L

Business process weakness identification, verification flow testing, and social engineering attack path analysis

Technology & EngineeringSocial Engineering Readiness

awareness-program-design

57L

Build and measure security awareness programs with baseline assessments, simulated attacks, and behavior change metrics

Technology & EngineeringSocial Engineering

mfa-bypass-testing

55L

Test MFA resilience through authorized adversary-in-the-middle, push fatigue, and recovery code exposure assessments

Technology & EngineeringSocial Engineering

phishing-campaign-design

58L

Design and execute authorized phishing simulation campaigns with GoPhish and King Phisher

Technology & EngineeringSocial Engineering

physical-social-engineering

57L

Conduct authorized physical social engineering assessments including tailgating, impersonation, and USB drops

Technology & EngineeringSocial Engineering

pretexting

56L

Develop and deploy pretexts for authorized social engineering engagements using structured methodology

Technology & EngineeringSocial Engineering

smishing

56L

Design and execute authorized SMS phishing simulations with proper consent and opt-out controls

Technology & EngineeringSocial Engineering

social-engineering-reporting

57L

Report social engineering assessment findings with metrics, human factor analysis, and executive-ready remediation plans

Technology & EngineeringSocial Engineering

spear-phishing

55L

Execute targeted spear-phishing simulations for authorized red team engagements with OSINT-driven pretexts

Technology & EngineeringSocial Engineering

vishing

55L

Conduct authorized voice phishing assessments against helpdesks and personnel targets

Technology & EngineeringSocial Engineering

watering-hole-assessment

55L

Simulate watering hole attacks in controlled environments to test browser security and web filtering controls

Technology & EngineeringSocial Engineering

adversary-emulation

47L

Map adversary behaviors to ATT&CK, emulate tactics, and validate detection coverage

Technology & EngineeringThreat Intel Agent

ioc-management

47L

IOC collection, enrichment, scoring, lifecycle management, and sharing via STIX/TAXII

Technology & EngineeringThreat Intel Agent

malware-triage

48L

Static and behavioral malware triage, config extraction, family clustering, and sandbox analysis

Technology & EngineeringThreat Intel Agent

threat-actor-tracking

49L

Track threat actors, campaigns, infrastructure patterns, and targeting trends

Technology & EngineeringThreat Intel Agent

threat-landscape

47L

Threat landscape analysis, trend reporting, and strategic risk forecasting

Technology & EngineeringThreat Intel Agent

access-control

141L

Authorization testing, privilege escalation, and IDOR detection for authorized security assessments

Technology & EngineeringWeb Appsec Agent

api-security-testing

163L

API auth flows, rate limiting, schema validation, and GraphQL security testing for authorized assessments

Technology & EngineeringWeb Appsec Agent

auth-testing

145L

Authentication review, credential handling, and session management testing for authorized assessments

Technology & EngineeringWeb Appsec Agent

business-logic

166L

Business logic flaw detection, race conditions, and workflow bypass testing for authorized assessments

Technology & EngineeringWeb Appsec Agent

input-validation

147L

XSS, SQLi, command injection, and template injection testing for authorized security assessments

Technology & EngineeringWeb Appsec Agent

web-config-review

156L

Security headers, CORS, CSP, cookie flags, and TLS configuration review for authorized assessments

Technology & EngineeringWeb Appsec Agent

bluetooth-review

142L

Bluetooth and BLE security assessment, pairing weakness analysis, sniffing, and device enumeration

Technology & EngineeringWireless Iot Agent

guest-network

136L

Guest network isolation testing, captive portal bypass, and visitor network security assessment

Technology & EngineeringWireless Iot Agent

home-network

140L

Home and small business network security assessment, router posture, smart device review, and WFH security

Technology & EngineeringWireless Iot Agent