Database
Browse 5,303 skills across 372 packs and 37 categories
AR Overlay Design
381LAvatar Design and Systems
447LDigital Twin Creation
414LHaptic Feedback Design for XR
470LImmersive Storytelling for VR/XR
401LMetaverse Architecture and Infrastructure
395LMixed Reality UX Design
402LSocial VR Experience Design
366LSpatial Computing Fundamentals
409LUnity VR/XR Development
512LUnreal Engine VR/XR Development
451LVirtual Economy Design
439LVirtual Event Management
337LVR Development Fundamentals
326LWebXR Development
514LApp Transport Security
155LApp transport security assessment, certificate pinning validation, HSTS enforcement, and TLS configuration review
Local Storage Security Review
158LMobile local storage security review, keychain/keystore assessment, and sensitive data exposure detection
Mobile API Security Testing
185LMobile API interception, proxy configuration, request manipulation, and backend API security testing
Mobile App Reverse Engineering
165LAPK and IPA decompilation, binary analysis, obfuscation review, and tampering detection assessment
Token Persistence and Session Management
162LMobile token persistence analysis, session management review, and authentication state security
Host Discovery
124LHost availability detection and network segmentation mapping for authorized security assessments
Network Exposure
138LExposure validation and firewall rule assessment for authorized security assessments
Port Scanning
124LPort discovery and service detection with nmap for authorized security assessments
Protocol Identification
141LProtocol fingerprinting and unusual service detection for authorized security assessments
Traffic Analysis
145LPacket capture interpretation, cleartext detection, and traffic analysis with tcpdump and Wireshark
Tunneling Validation
140LSecure tunneling validation, proxy path review, and VPN configuration checks for authorized assessments
Baby Sleep Training
93Lchild development specialist and certified pediatric sleep consultant with deep knowledge of infant sleep science, attachment theory, and the practical realities of sleep-deprived families. You unders.
Childhood Play
92Lchild development specialist and play-based learning advocate with deep expertise in how play shapes cognitive, emotional, social, and physical development from infancy through adolescence. You draw o.
College Prep Parenting
95Lchild development specialist and college readiness advisor who has guided families through the post-secondary planning process for over a decade. You approach college preparation as one component of a.
Gentle Parenting
91Lchild development specialist and parenting educator deeply grounded in attachment theory, interpersonal neurobiology, and the research of pioneers like Daniel Siegel, Tina Payne Bryson, and Gordon Neu.
Homeschooling
90Lchild development specialist and veteran homeschooling educator who has guided hundreds of families through designing, implementing, and sustaining home education programs across varied philosophies, .
Montessori At Home
89Lchild development specialist and certified Montessori educator with deep experience adapting Montessori philosophy for home environments across diverse family structures and budgets. You understand th.
Newborn Care
86Lboard-certified neonatal care specialist and parenting educator with over fifteen years of clinical and community education experience. You draw on evidence-based guidelines from the American Academy .
Special Needs Parenting
93Lchild development specialist and special needs family advocate with extensive experience supporting families navigating disability diagnoses, educational systems, therapeutic interventions, and the em.
Teen Communication
91Lchild development specialist and adolescent psychology educator with deep experience helping families navigate the teenage years. You understand that adolescence is a period of profound neurological, .
Toddler Behavior
90Lchild development specialist and parenting educator with extensive experience in early childhood behavior and developmental psychology. You understand that toddlerhood is a period of explosive brain g.
Credential Attack Techniques
45LCredential attack techniques for authorized assessments including password spraying, Kerberoasting, NTLM relay, and credential dumping
Defense Evasion Testing
45LTesting detection coverage through AMSI bypass, process injection, and living-off-the-land techniques for detection validation
Initial Access Techniques
45LInitial access techniques for authorized penetration tests including phishing, exposed services, and credential attacks
Lateral Movement Techniques
45LLateral movement techniques for authorized assessments including pass-the-hash, WMI, PSExec, and RDP pivoting
Payload Development
46LCustom payload development for authorized assessments including AV/EDR testing and C2 framework usage
Persistence Mechanism Testing
46LPersistence mechanism testing for authorized assessments covering scheduled tasks, registry keys, services, and DLL side-loading
Privilege Escalation Techniques
46LWindows and Linux privilege escalation techniques for authorized penetration testing including kernel exploits, misconfigurations, and token abuse
Active Directory Attack Path Analysis
46LActive Directory attack path analysis using BloodHound, Certify, and Rubeus for authorized security assessments
Attack Infrastructure
45LAttack infrastructure setup including redirectors, domain fronting assessment, and phishing infrastructure for authorized engagements
C2 Framework Operations
45LCommand and control framework setup and operation for authorized penetration tests with OPSEC considerations
Cloud Exploitation
45LCloud exploitation techniques for authorized assessments covering metadata abuse, SSRF to cloud, and IAM role assumption
Debrief and Retesting
47LClient debrief methodology, remediation validation, retest procedures, and knowledge transfer for penetration testing engagements
Penetration Test Report Writing
46LProfessional penetration test report writing covering executive summary, technical findings, risk ratings, and remediation guidance
Engagement Planning
48LRules of engagement definition, scope documentation, authorization validation, and legal compliance for penetration testing
External Network Penetration Testing
46LExternal network penetration testing methodology aligned with PTES for authorized security assessments
Internal Network Penetration Testing
45LInternal network penetration testing and assumed breach methodology for authorized security assessments
Physical Penetration Testing
45LPhysical penetration testing methodology including access control bypass, tailgating assessment, and social engineering for authorized engagements
Purple Team Exercises
45LPurple team exercise methodology for cooperative adversary simulation and detection validation in authorized engagements
Red Team Operations
45LRed team engagement methodology covering objective-based adversary simulation and stealth assessment for authorized operations
Web Application Penetration Testing
47LWeb application penetration testing aligned with the OWASP Testing Guide for authorized security assessments
Wireless Penetration Testing
45LWireless network penetration testing covering WPA/WPA2/WPA3 assessment and rogue access point detection for authorized engagements
Circus Arts
71Lprofessional circus artist and instructor with over twenty years of experience performing and teaching across aerial arts, acrobatics, clowning, fire manipulation, and juggling. You have worked in tra.
Dance Choreography
71Lprofessional choreographer and dance artist with over twenty years of experience creating work across concert dance, commercial, musical theater, and site-specific performance. You have choreographed .
Improv Comedy
71Lveteran improviser, instructor, and artistic director with over twenty years of experience performing and teaching at major improv theaters. You have performed thousands of shows across short form, lo.