Database
Browse 4,557 skills across 394 packs and 37 categories
privilege-escalation-techniques
46LWindows and Linux privilege escalation techniques for authorized penetration testing including kernel exploits, misconfigurations, and token abuse
ad-attack-paths
46LActive Directory attack path analysis using BloodHound, Certify, and Rubeus for authorized security assessments
attack-infrastructure
45LAttack infrastructure setup including redirectors, domain fronting assessment, and phishing infrastructure for authorized engagements
c2-framework
45LCommand and control framework setup and operation for authorized penetration tests with OPSEC considerations
cloud-exploitation
45LCloud exploitation techniques for authorized assessments covering metadata abuse, SSRF to cloud, and IAM role assumption
debrief-retesting
47LClient debrief methodology, remediation validation, retest procedures, and knowledge transfer for penetration testing engagements
report-writing
46LProfessional penetration test report writing covering executive summary, technical findings, risk ratings, and remediation guidance
engagement-planning
48LRules of engagement definition, scope documentation, authorization validation, and legal compliance for penetration testing
external-pentest
46LExternal network penetration testing methodology aligned with PTES for authorized security assessments
internal-pentest
45LInternal network penetration testing and assumed breach methodology for authorized security assessments
physical-pentest
45LPhysical penetration testing methodology including access control bypass, tailgating assessment, and social engineering for authorized engagements
purple-team
45LPurple team exercise methodology for cooperative adversary simulation and detection validation in authorized engagements
red-team-operations
45LRed team engagement methodology covering objective-based adversary simulation and stealth assessment for authorized operations
web-app-pentest
47LWeb application penetration testing aligned with the OWASP Testing Guide for authorized security assessments
wireless-pentest
45LWireless network penetration testing covering WPA/WPA2/WPA3 assessment and rogue access point detection for authorized engagements
asn-ip-mapping
102LASN/IP range awareness, WHOIS lookups, and BGP route analysis for authorized security assessments
asset-discovery
99LAsset discovery, DNS enumeration, and subdomain mapping for authorized security assessments
attack-surface-mapping
129LExternal attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments
certificate-analysis
131LCertificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments
osint-gathering
119LOpen source intelligence collection, data leak checks, and metadata extraction for authorized assessments
service-inventory
114LService inventory and technology fingerprinting for authorized security assessments
compliance-mapping
172LCompliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA
executive-summary
182LExecutive summary writing and non-technical security communication
findings-documentation
177LClear vulnerability findings documentation with reproducible steps and evidence handling
remediation-mapping
198LRemediation mapping, fix prioritization, and timeline estimation
severity-scoring
186LCVSS scoring, risk rating methodology, and business impact assessment
change-safety
180LChange safety guardrails for security testing, do-not-touch asset protection, and rollback planning
legal-authorization
170LLegal authorization verification, rules of engagement compliance, and regulatory awareness for security testing
proof-only-mode
153LNon-destructive vulnerability validation, proof-of-concept without exploitation, and safe evidence collection
rate-limiting-safety
153LSafe testing rate limits, resource-aware scanning, and production disruption avoidance
scope-enforcement
149LScope enforcement for penetration testing, authorized target validation, and boundary compliance
awareness-gaps
193LSecurity awareness gap assessment, training effectiveness measurement, and human risk quantification
helpdesk-abuse
191LHelpdesk abuse path identification, pretexting scenarios, and identity verification bypass testing
phishing-simulation
176LPhishing simulation campaign planning, pretext development, payload design, and metrics collection
physical-security
211LPhysical security assessment, tailgating testing, badge cloning awareness, and facility access review
process-weakness
185LBusiness process weakness identification, verification flow testing, and social engineering attack path analysis
awareness-program-design
57LBuild and measure security awareness programs with baseline assessments, simulated attacks, and behavior change metrics
mfa-bypass-testing
55LTest MFA resilience through authorized adversary-in-the-middle, push fatigue, and recovery code exposure assessments
phishing-campaign-design
58LDesign and execute authorized phishing simulation campaigns with GoPhish and King Phisher
physical-social-engineering
57LConduct authorized physical social engineering assessments including tailgating, impersonation, and USB drops
pretexting
56LDevelop and deploy pretexts for authorized social engineering engagements using structured methodology
smishing
56LDesign and execute authorized SMS phishing simulations with proper consent and opt-out controls
social-engineering-reporting
57LReport social engineering assessment findings with metrics, human factor analysis, and executive-ready remediation plans
spear-phishing
55LExecute targeted spear-phishing simulations for authorized red team engagements with OSINT-driven pretexts
vishing
55LConduct authorized voice phishing assessments against helpdesks and personnel targets
watering-hole-assessment
55LSimulate watering hole attacks in controlled environments to test browser security and web filtering controls
adversary-emulation
47LMap adversary behaviors to ATT&CK, emulate tactics, and validate detection coverage
ioc-management
47LIOC collection, enrichment, scoring, lifecycle management, and sharing via STIX/TAXII
malware-triage
48LStatic and behavioral malware triage, config extraction, family clustering, and sandbox analysis
threat-actor-tracking
49LTrack threat actors, campaigns, infrastructure patterns, and targeting trends
threat-landscape
47LThreat landscape analysis, trend reporting, and strategic risk forecasting
access-control
141LAuthorization testing, privilege escalation, and IDOR detection for authorized security assessments
api-security-testing
163LAPI auth flows, rate limiting, schema validation, and GraphQL security testing for authorized assessments
auth-testing
145LAuthentication review, credential handling, and session management testing for authorized assessments
business-logic
166LBusiness logic flaw detection, race conditions, and workflow bypass testing for authorized assessments
input-validation
147LXSS, SQLi, command injection, and template injection testing for authorized security assessments
web-config-review
156LSecurity headers, CORS, CSP, cookie flags, and TLS configuration review for authorized assessments
bluetooth-review
142LBluetooth and BLE security assessment, pairing weakness analysis, sniffing, and device enumeration
guest-network
136LGuest network isolation testing, captive portal bypass, and visitor network security assessment
home-network
140LHome and small business network security assessment, router posture, smart device review, and WFH security