Skip to main content

Database

Browse 4,557 skills across 394 packs and 37 categories

Showing 1681–1708 of 1,708 skills
1,708 skills found in Technology & Engineering

iot-exposure

137L

IoT device exposure assessment, default credential testing, firmware review, and protocol analysis

Technology & EngineeringWireless Iot Agent

wifi-assessment

134L

Wi-Fi security configuration review, WPA enterprise testing, rogue AP detection, and wireless attack surface analysis

Technology & EngineeringWireless Iot Agent

brand-mention-monitoring

46L

Monitor mentions of brands, domains, and employee emails across dark web sources

Technology & EngineeringDark Web Monitoring

leak-site-monitoring

46L

Ransomware leak-site monitoring, extortion workflow tracking, and victim notification

Technology & EngineeringDark Web Monitoring

tor-ecosystem-awareness

46L

Onion service structure, abuse patterns, hosting indicators, and scam typologies

Technology & EngineeringDark Web Monitoring

underground-market-research

48L

Study productized crime trends including access sales, stealer logs, and fraud services (research-only)

Technology & EngineeringDark Web Monitoring

credential-leak-detection

46L

Detect credential leaks, stealer-log references, and breach monitoring for organizational accounts

Technology & EngineeringLeak Exposure Monitoring

data-exposure-analysis

46L

Detect customer data mentions, PII exposure, and data dump analysis for breach assessment

Technology & EngineeringLeak Exposure Monitoring

executive-exposure-review

48L

Assess doxxing risk, credential reuse, and public digital footprint for high-risk individuals

Technology & EngineeringLeak Exposure Monitoring

source-code-exposure

47L

Detect source code exposure, config dumps, and secret leaks in public repositories

Technology & EngineeringLeak Exposure Monitoring

supply-chain-monitoring

48L

Monitor for typosquat packages, dependency abuse, malicious updates, and fake repositories

Technology & EngineeringLeak Exposure Monitoring

app-sideload-abuse

48L

Detect app sideload abuse, marketplace scams, and unauthorized application distribution

Technology & EngineeringBrand Protection

brand-monitoring-automation

49L

Automated brand monitoring, alert triage, and takedown workflow orchestration

Technology & EngineeringBrand Protection

counterfeit-detection

47L

Detect counterfeit sites, pirated applications, and fake login portals impersonating your brand

Technology & EngineeringBrand Protection

ransomware-readiness

48L

Ransomware resilience testing, backup validation, recovery planning, and readiness assessment

Technology & EngineeringBrand Protection

brand-abuse-detection

46L

Detect fake domains, spoofed support channels, and counterfeit sites impersonating your brand

Technology & EngineeringFraud Impersonation

crypto-wallet-risk

46L

Wallet clustering, scam campaign tracking, sanction screening, and payment flow review

Technology & EngineeringFraud Impersonation

deception-testing

47L

Deploy honey assets, canary tokens, decoy credentials, and sinkhole infrastructure for threat detection

Technology & EngineeringFraud Impersonation

phishing-intelligence

47L

Phishing kit tracking, lure analysis, sender clustering, and landing page fingerprinting

Technology & EngineeringFraud Impersonation

social-impersonation

47L

Detect fake social accounts, executive impersonation, and marketplace fraud impersonation

Technology & EngineeringFraud Impersonation

business-email-compromise

55L

Simulate BEC attacks to test financial controls, authorization procedures, and executive impersonation defenses

Technology & EngineeringHuman Factor Security

credential-harvesting

57L

Build authorized credential harvesting pages for phishing simulations using GoPhish, Evilginx, and transparent proxies

Technology & EngineeringHuman Factor Security

deepfake-awareness

55L

Build organizational awareness and verification procedures against deepfake voice, video, and AI-generated content threats

Technology & EngineeringHuman Factor Security

helpdesk-exploitation

55L

Test helpdesk and IT support social engineering resilience through authorized identity verification bypass assessments

Technology & EngineeringHuman Factor Security

insider-threat-assessment

55L

Assess insider threat program maturity through gap analysis of behavioral indicators, DLP, and access controls

Technology & EngineeringHuman Factor Security

red-team-social-engineering

58L

Execute full-scope red team social engineering campaigns combining email, phone, physical, and technical vectors

Technology & EngineeringHuman Factor Security

social-media-reconnaissance

55L

Conduct social media OSINT for authorized engagements to map organizational exposure and employee data leakage

Technology & EngineeringHuman Factor Security

supply-chain-social-engineering

55L

Assess supply chain and third-party social engineering risks through vendor impersonation and trusted relationship abuse testing

Technology & EngineeringHuman Factor Security