Database
Browse 5,303 skills across 372 packs and 37 categories
API Authentication Flow Testing
139LOAuth2, API key, and HMAC authentication flow testing for security assessments
Rate Limit Testing
146LRate limiting bypass testing, throttle evasion, and abuse prevention assessment
API Schema Validation Testing
155LAPI schema validation testing, fuzzing, and type confusion attacks
Third-Party Connector Security
138LThird-party API integration risk assessment and supply chain security testing
Token Handling Security
126LJWT/OAuth token analysis, validation, and expiry testing for API security assessments
Webhook Security Testing
146LWebhook trust boundary testing, signature verification, and callback security
App Sideload Abuse Detection
48LDetect app sideload abuse, marketplace scams, and unauthorized application distribution
Brand Monitoring Automation
49LAutomated brand monitoring, alert triage, and takedown workflow orchestration
Counterfeit Detection
47LDetect counterfeit sites, pirated applications, and fake login portals impersonating your brand
Ransomware Readiness
48LRansomware resilience testing, backup validation, recovery planning, and readiness assessment
AWS Security Posture
153LAWS security posture review including S3 exposure, IAM policies, and CloudTrail for authorized assessments
Azure Security Posture
150LAzure security assessment including Entra ID, NSGs, and Key Vault for authorized security assessments
Cloud Logging & Monitoring
150LCloudTrail, Azure Monitor, and GCP logging coverage gap assessment for authorized security assessments
Cloud Network Policy
152LVPC rules, security groups, and cloud network segmentation assessment for authorized security assessments
Cloud Storage Exposure
167LPublic bucket and blob detection, storage ACL review for authorized security assessments
GCP Security Posture
158LGCP security review including service accounts, storage, and VPC for authorized security assessments
Corporate Compliance
63LDesign and implement corporate compliance programs covering SOX requirements, internal controls, whistleblower protections, and ethics frameworks
Corporate Governance
63LGuide board structure, fiduciary duties, shareholder rights, and bylaw drafting for corporations of all sizes
Corporate Restructuring
63LNavigate corporate restructuring including Chapter 11 bankruptcy, out-of-court workouts, assignments for benefit of creditors, and receivership
Executive Compensation
63LStructure executive compensation packages including equity awards, deferred compensation, golden parachutes, and clawback provisions
Franchise Law
63LNavigate franchise regulation including FDD preparation, state registration, relationship laws, and termination compliance
Joint Ventures
63LStructure joint venture agreements including governance frameworks, exit mechanisms, intellectual property allocation, and dispute resolution
Mergers And Acquisitions
63LStructure and execute M&A transactions including due diligence, deal documentation, representations, and closing conditions
Nonprofit Formation
63LGuide nonprofit organization formation including 501(c)(3) qualification, bylaws drafting, tax exemption applications, and governance best practices
Private Placements
71LStructure Regulation D private placements including accredited investor verification, PPM preparation, and blue sky compliance
Securities Regulation
62LNavigate SEC filing requirements, registration exemptions, public offerings, and insider trading compliance
Shareholder Agreements
63LDraft and negotiate shareholder agreements including buy-sell provisions, drag-along and tag-along rights, and voting arrangements
Venture Financing
63LStructure venture capital transactions including SAFE notes, priced rounds, anti-dilution protections, and liquidation preferences
Bitcoin Fundamentals
55LDeep expertise in Bitcoin protocol mechanics, UTXO model, mining economics,
Cold Storage Security
55LExpert-level guidance on cryptocurrency cold storage, hardware wallet operation, seed phrase
Crypto Research
55LRigorous cryptocurrency research methodology covering on-chain analysis, tokenomics evaluation,
Crypto Tax
55LExpert knowledge of cryptocurrency taxation including cost basis methods, DeFi-specific
DAO Governance
55LExpert knowledge of DAO governance design including voting mechanisms, delegation systems,
DeFi Yield Strategies
55LExpert-level understanding of DeFi yield generation through lending, liquidity provision,
Ethereum Fundamentals
55LComprehensive knowledge of Ethereum's execution environment, gas mechanics,
Layer 2 Scaling
55LDeep technical expertise in Layer 2 scaling solutions including optimistic and ZK rollups,
NFT Strategy
55LStrategic expertise in NFT minting, trading, utility design, community building,
Stablecoin Mechanics
55LDeep technical understanding of stablecoin design patterns including algorithmic, collateralized,
Brand Mention Monitoring (Dark Web)
46LMonitor mentions of brands, domains, and employee emails across dark web sources
Leak Site Monitoring
46LRansomware leak-site monitoring, extortion workflow tracking, and victim notification
Tor Ecosystem Awareness
46LOnion service structure, abuse patterns, hosting indicators, and scam typologies
Underground Market Research
48LStudy productized crime trends including access sales, stealer logs, and fraud services (research-only)
Databricks Delta Lake
203LDatabricks Workflows & Jobs
293LDatabricks MLflow
218LDatabricks Notebooks
211LDatabricks Delta Live Tables (DLT)
210LDatabricks PySpark
187LDatabricks SQL
229LDatabricks Unity Catalog
205LAlert Quality Review
162LAlert quality review, noise reduction, and detection tuning methodology
Detection Engineering
223LDetection rule writing, SIGMA/YARA rule development, and behavioral detection
Forensic Readiness Assessment
140LForensic log retention assessment, evidence preservation, and attack traceability
Incident Response Assessment
204LIR handoff quality assessment, playbook review, and communication evaluation
SIEM Coverage Assessment
144LSIEM coverage assessment, log source gaps, and detection blind spot analysis
Threat Hunting
186LProactive threat hunting methodology with hypothesis-driven search techniques
Accessible Events
53Laccessible events specialist and inclusion consultant who ensures that conferences, meetings, performances, community gatherings, and other events are genuinely welcoming and functional for disabled a.
ADA Compliance
53Ldisability rights attorney and ADA compliance specialist with deep expertise in the Americans with Disabilities Act and its amendments. You understand Title I (employment), Title II (state and local g.
Assistive Technology
53Lassistive technology specialist with hands-on expertise in the full ecosystem of tools that disabled people use to interact with technology, navigate physical spaces, and participate in daily life. Yo.
Cognitive Accessibility
53Lcognitive accessibility specialist who designs environments, communications, and systems that are understandable and usable by people with a wide range of cognitive abilities. Your expertise covers in.