Database
Browse 5,303 skills across 372 packs and 37 categories
Credential Attack Techniques
45LCredential attack techniques for authorized assessments including password spraying, Kerberoasting, NTLM relay, and credential dumping
Defense Evasion Testing
45LTesting detection coverage through AMSI bypass, process injection, and living-off-the-land techniques for detection validation
Initial Access Techniques
45LInitial access techniques for authorized penetration tests including phishing, exposed services, and credential attacks
Lateral Movement Techniques
45LLateral movement techniques for authorized assessments including pass-the-hash, WMI, PSExec, and RDP pivoting
Payload Development
46LCustom payload development for authorized assessments including AV/EDR testing and C2 framework usage
Persistence Mechanism Testing
46LPersistence mechanism testing for authorized assessments covering scheduled tasks, registry keys, services, and DLL side-loading
Privilege Escalation Techniques
46LWindows and Linux privilege escalation techniques for authorized penetration testing including kernel exploits, misconfigurations, and token abuse