Database
Browse 4,557 skills across 394 packs and 37 categories
iot-exposure
137LIoT device exposure assessment, default credential testing, firmware review, and protocol analysis
wifi-assessment
134LWi-Fi security configuration review, WPA enterprise testing, rogue AP detection, and wireless attack surface analysis
brand-mention-monitoring
46LMonitor mentions of brands, domains, and employee emails across dark web sources
leak-site-monitoring
46LRansomware leak-site monitoring, extortion workflow tracking, and victim notification
tor-ecosystem-awareness
46LOnion service structure, abuse patterns, hosting indicators, and scam typologies
underground-market-research
48LStudy productized crime trends including access sales, stealer logs, and fraud services (research-only)
credential-leak-detection
46LDetect credential leaks, stealer-log references, and breach monitoring for organizational accounts
data-exposure-analysis
46LDetect customer data mentions, PII exposure, and data dump analysis for breach assessment
executive-exposure-review
48LAssess doxxing risk, credential reuse, and public digital footprint for high-risk individuals
source-code-exposure
47LDetect source code exposure, config dumps, and secret leaks in public repositories
supply-chain-monitoring
48LMonitor for typosquat packages, dependency abuse, malicious updates, and fake repositories
app-sideload-abuse
48LDetect app sideload abuse, marketplace scams, and unauthorized application distribution
brand-monitoring-automation
49LAutomated brand monitoring, alert triage, and takedown workflow orchestration
counterfeit-detection
47LDetect counterfeit sites, pirated applications, and fake login portals impersonating your brand
ransomware-readiness
48LRansomware resilience testing, backup validation, recovery planning, and readiness assessment
brand-abuse-detection
46LDetect fake domains, spoofed support channels, and counterfeit sites impersonating your brand
crypto-wallet-risk
46LWallet clustering, scam campaign tracking, sanction screening, and payment flow review
deception-testing
47LDeploy honey assets, canary tokens, decoy credentials, and sinkhole infrastructure for threat detection
phishing-intelligence
47LPhishing kit tracking, lure analysis, sender clustering, and landing page fingerprinting
social-impersonation
47LDetect fake social accounts, executive impersonation, and marketplace fraud impersonation
business-email-compromise
55LSimulate BEC attacks to test financial controls, authorization procedures, and executive impersonation defenses
credential-harvesting
57LBuild authorized credential harvesting pages for phishing simulations using GoPhish, Evilginx, and transparent proxies
deepfake-awareness
55LBuild organizational awareness and verification procedures against deepfake voice, video, and AI-generated content threats
helpdesk-exploitation
55LTest helpdesk and IT support social engineering resilience through authorized identity verification bypass assessments
insider-threat-assessment
55LAssess insider threat program maturity through gap analysis of behavioral indicators, DLP, and access controls
red-team-social-engineering
58LExecute full-scope red team social engineering campaigns combining email, phone, physical, and technical vectors
social-media-reconnaissance
55LConduct social media OSINT for authorized engagements to map organizational exposure and employee data leakage
supply-chain-social-engineering
55LAssess supply chain and third-party social engineering risks through vendor impersonation and trusted relationship abuse testing