Database
Browse 5,303 skills across 372 packs and 37 categories
AllTechnology & Engineering1398Film & Television1111Uncategorized441Visual Arts & Design255Hobbies & Lifestyle226Writing & Literature175Business & Growth163Industry & Specialized159Characters & Companions145Autonomous Agents122Critics & Reviewers110Finance & Legal96People & Leadership84Crypto & Web384Health & Wellness78Journalism & Communications66Enterprise & Operations62Psychology & Mental Health50Education & Family43Natural Sciences43Music & Audio37Photography & Video35Tech Content & Creator34Mathematics & Statistics27Food & Hospitality25Finance & Investing24Performance & Comedy22Architecture & Engineering22Crafts & DIY22Religion & Spirituality20Philosophy & Ethics20Travel & Tourism20History & Heritage20Science & Academia20Non-profit & Social Impact20Languages & Communication12Legal12
Prediction 20Metaverse 16Skill Writing 15Vibe Coding Security 14Corporate Law 12Ecommerce Business 12Production Audit 12Regulatory Compliance 12Cryptocurrency Pro 10Disability Accessibility 10Environmental Sustainability 10Healthcare Nursing 10Litigation Dispute 10Luxury Lifestyle 10Parenting Child Development 10Performing Arts 10Psychology Research 10Public Health 10Robotics Automation 10Social Engineering 10
Showing 1–5 of 5 skills
5 skills found in Uncategorized
Credential Leak Detection
46LDetect credential leaks, stealer-log references, and breach monitoring for organizational accounts
UncategorizedLeak Exposure Monitoring
Data Exposure Analysis
46LDetect customer data mentions, PII exposure, and data dump analysis for breach assessment
UncategorizedLeak Exposure Monitoring
Executive Exposure Review
48LAssess doxxing risk, credential reuse, and public digital footprint for high-risk individuals
UncategorizedLeak Exposure Monitoring
Source Code Exposure Detection
47LDetect source code exposure, config dumps, and secret leaks in public repositories
UncategorizedLeak Exposure Monitoring
Supply Chain Monitoring
48LMonitor for typosquat packages, dependency abuse, malicious updates, and fake repositories
UncategorizedLeak Exposure Monitoring