Skip to main content

Database

Browse 5,303 skills across 372 packs and 37 categories

Showing 1–60 of 441 skills
441 skills found in Uncategorized

API Authentication Flow Testing

139L

OAuth2, API key, and HMAC authentication flow testing for security assessments

UncategorizedApi Security Agent

Rate Limit Testing

146L

Rate limiting bypass testing, throttle evasion, and abuse prevention assessment

UncategorizedApi Security Agent

API Schema Validation Testing

155L

API schema validation testing, fuzzing, and type confusion attacks

UncategorizedApi Security Agent

Third-Party Connector Security

138L

Third-party API integration risk assessment and supply chain security testing

UncategorizedApi Security Agent

Token Handling Security

126L

JWT/OAuth token analysis, validation, and expiry testing for API security assessments

UncategorizedApi Security Agent

Webhook Security Testing

146L

Webhook trust boundary testing, signature verification, and callback security

UncategorizedApi Security Agent

App Sideload Abuse Detection

48L

Detect app sideload abuse, marketplace scams, and unauthorized application distribution

UncategorizedBrand Protection

Brand Monitoring Automation

49L

Automated brand monitoring, alert triage, and takedown workflow orchestration

UncategorizedBrand Protection

Counterfeit Detection

47L

Detect counterfeit sites, pirated applications, and fake login portals impersonating your brand

UncategorizedBrand Protection

Ransomware Readiness

48L

Ransomware resilience testing, backup validation, recovery planning, and readiness assessment

UncategorizedBrand Protection

AWS Security Posture

153L

AWS security posture review including S3 exposure, IAM policies, and CloudTrail for authorized assessments

UncategorizedCloud Security Agent

Azure Security Posture

150L

Azure security assessment including Entra ID, NSGs, and Key Vault for authorized security assessments

UncategorizedCloud Security Agent

Cloud Logging & Monitoring

150L

CloudTrail, Azure Monitor, and GCP logging coverage gap assessment for authorized security assessments

UncategorizedCloud Security Agent

Cloud Network Policy

152L

VPC rules, security groups, and cloud network segmentation assessment for authorized security assessments

UncategorizedCloud Security Agent

Cloud Storage Exposure

167L

Public bucket and blob detection, storage ACL review for authorized security assessments

UncategorizedCloud Security Agent

GCP Security Posture

158L

GCP security review including service accounts, storage, and VPC for authorized security assessments

UncategorizedCloud Security Agent

Corporate Compliance

63L

Design and implement corporate compliance programs covering SOX requirements, internal controls, whistleblower protections, and ethics frameworks

UncategorizedCorporate Law

Corporate Governance

63L

Guide board structure, fiduciary duties, shareholder rights, and bylaw drafting for corporations of all sizes

UncategorizedCorporate Law

Corporate Restructuring

63L

Navigate corporate restructuring including Chapter 11 bankruptcy, out-of-court workouts, assignments for benefit of creditors, and receivership

UncategorizedCorporate Law

Executive Compensation

63L

Structure executive compensation packages including equity awards, deferred compensation, golden parachutes, and clawback provisions

UncategorizedCorporate Law

Franchise Law

63L

Navigate franchise regulation including FDD preparation, state registration, relationship laws, and termination compliance

UncategorizedCorporate Law

Joint Ventures

63L

Structure joint venture agreements including governance frameworks, exit mechanisms, intellectual property allocation, and dispute resolution

UncategorizedCorporate Law

Mergers And Acquisitions

63L

Structure and execute M&A transactions including due diligence, deal documentation, representations, and closing conditions

UncategorizedCorporate Law

Nonprofit Formation

63L

Guide nonprofit organization formation including 501(c)(3) qualification, bylaws drafting, tax exemption applications, and governance best practices

UncategorizedCorporate Law

Private Placements

71L

Structure Regulation D private placements including accredited investor verification, PPM preparation, and blue sky compliance

UncategorizedCorporate Law

Securities Regulation

62L

Navigate SEC filing requirements, registration exemptions, public offerings, and insider trading compliance

UncategorizedCorporate Law

Shareholder Agreements

63L

Draft and negotiate shareholder agreements including buy-sell provisions, drag-along and tag-along rights, and voting arrangements

UncategorizedCorporate Law

Venture Financing

63L

Structure venture capital transactions including SAFE notes, priced rounds, anti-dilution protections, and liquidation preferences

UncategorizedCorporate Law

Bitcoin Fundamentals

55L

Deep expertise in Bitcoin protocol mechanics, UTXO model, mining economics,

UncategorizedCryptocurrency Pro

Cold Storage Security

55L

Expert-level guidance on cryptocurrency cold storage, hardware wallet operation, seed phrase

UncategorizedCryptocurrency Pro

Crypto Research

55L

Rigorous cryptocurrency research methodology covering on-chain analysis, tokenomics evaluation,

UncategorizedCryptocurrency Pro

Crypto Tax

55L

Expert knowledge of cryptocurrency taxation including cost basis methods, DeFi-specific

UncategorizedCryptocurrency Pro

DAO Governance

55L

Expert knowledge of DAO governance design including voting mechanisms, delegation systems,

UncategorizedCryptocurrency Pro

DeFi Yield Strategies

55L

Expert-level understanding of DeFi yield generation through lending, liquidity provision,

UncategorizedCryptocurrency Pro

Ethereum Fundamentals

55L

Comprehensive knowledge of Ethereum's execution environment, gas mechanics,

UncategorizedCryptocurrency Pro

Layer 2 Scaling

55L

Deep technical expertise in Layer 2 scaling solutions including optimistic and ZK rollups,

UncategorizedCryptocurrency Pro

NFT Strategy

55L

Strategic expertise in NFT minting, trading, utility design, community building,

UncategorizedCryptocurrency Pro

Stablecoin Mechanics

55L

Deep technical understanding of stablecoin design patterns including algorithmic, collateralized,

UncategorizedCryptocurrency Pro

Brand Mention Monitoring (Dark Web)

46L

Monitor mentions of brands, domains, and employee emails across dark web sources

UncategorizedDark Web Monitoring

Leak Site Monitoring

46L

Ransomware leak-site monitoring, extortion workflow tracking, and victim notification

UncategorizedDark Web Monitoring

Tor Ecosystem Awareness

46L

Onion service structure, abuse patterns, hosting indicators, and scam typologies

UncategorizedDark Web Monitoring

Underground Market Research

48L

Study productized crime trends including access sales, stealer logs, and fraud services (research-only)

UncategorizedDark Web Monitoring

Databricks Delta Lake

203L

UncategorizedDatabricks

Databricks Workflows & Jobs

293L

UncategorizedDatabricks

Databricks MLflow

218L

UncategorizedDatabricks

Databricks Notebooks

211L

UncategorizedDatabricks

Databricks Delta Live Tables (DLT)

210L

UncategorizedDatabricks

Databricks PySpark

187L

UncategorizedDatabricks

Databricks SQL

229L

UncategorizedDatabricks

Databricks Unity Catalog

205L

UncategorizedDatabricks

Alert Quality Review

162L

Alert quality review, noise reduction, and detection tuning methodology

UncategorizedDetection Logging Agent

Detection Engineering

223L

Detection rule writing, SIGMA/YARA rule development, and behavioral detection

UncategorizedDetection Logging Agent

Forensic Readiness Assessment

140L

Forensic log retention assessment, evidence preservation, and attack traceability

UncategorizedDetection Logging Agent

Incident Response Assessment

204L

IR handoff quality assessment, playbook review, and communication evaluation

UncategorizedDetection Logging Agent

SIEM Coverage Assessment

144L

SIEM coverage assessment, log source gaps, and detection blind spot analysis

UncategorizedDetection Logging Agent

Threat Hunting

186L

Proactive threat hunting methodology with hypothesis-driven search techniques

UncategorizedDetection Logging Agent

Accessible Events

53L

accessible events specialist and inclusion consultant who ensures that conferences, meetings, performances, community gatherings, and other events are genuinely welcoming and functional for disabled a.

UncategorizedDisability Accessibility

ADA Compliance

53L

disability rights attorney and ADA compliance specialist with deep expertise in the Americans with Disabilities Act and its amendments. You understand Title I (employment), Title II (state and local g.

UncategorizedDisability Accessibility

Assistive Technology

53L

assistive technology specialist with hands-on expertise in the full ecosystem of tools that disabled people use to interact with technology, navigate physical spaces, and participate in daily life. Yo.

UncategorizedDisability Accessibility

Cognitive Accessibility

53L

cognitive accessibility specialist who designs environments, communications, and systems that are understandable and usable by people with a wide range of cognitive abilities. Your expertise covers in.

UncategorizedDisability Accessibility