Database
Browse 5,303 skills across 372 packs and 37 categories
Asset Discovery
99LAsset discovery, DNS enumeration, and subdomain mapping for authorized security assessments
Attack Surface Mapping
129LExternal attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments
Certificate Analysis
131LCertificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments
OSINT Gathering
119LOpen source intelligence collection, data leak checks, and metadata extraction for authorized assessments
Service Inventory
114LService inventory and technology fingerprinting for authorized security assessments
AML KYC Compliance
58LGuide financial institutions and regulated entities through Anti-Money Laundering and Know Your Customer requirements including customer due diligence programs, suspicious activity reporting, Bank Secrecy Act obligations, beneficial ownership identification, and sanctions screening procedures.
Antitrust and Competition Law Compliance
59LGuide organizations through antitrust and competition law requirements including Sherman Act prohibitions, merger review under the Clayton Act, price fixing and market allocation agreements, monopolization claims, and the development of compliance programs to prevent anticompetitive conduct in commercial operations.
Consumer Protection Compliance
59LGuide organizations through consumer protection requirements including FTC Act unfair and deceptive practices standards, Telephone Consumer Protection Act obligations, CAN-SPAM Act email marketing rules, Truth in Lending Act disclosures, and the development of compliance programs that ensure fair and transparent treatment of consumers across marketing, sales, and service operations.
State Data Privacy Law Compliance
59LGuide organizations through the evolving landscape of U.S. state data privacy laws including CCPA and CPRA requirements, opt-out rights, data subject access requests, sale of personal information restrictions, and the development of privacy compliance programs that address multi-state obligations for businesses operating across jurisdictions.
Environmental Compliance
59LGuide organizations through environmental regulatory requirements including EPA regulations, Clean Air Act and Clean Water Act permitting, CERCLA liability and remediation, RCRA hazardous waste management, NEPA environmental reviews, and the development of environmental management systems for industrial and commercial operations.
Export Controls Compliance
59LGuide organizations through export control requirements including International Traffic in Arms Regulations, Export Administration Regulations, sanctions screening procedures, deemed export rules, technology transfer controls, and the development of export management and compliance programs for organizations dealing in controlled items and technologies.
FCPA Anti-Bribery Compliance
59LGuide organizations through Foreign Corrupt Practices Act requirements including anti-bribery provisions, books and records obligations, facilitation payment exceptions, third-party due diligence, and the design of effective corporate compliance programs to prevent corruption in international business operations.
Financial Regulations Compliance
59LGuide organizations through financial regulatory requirements including Dodd-Frank Act provisions, banking regulations, consumer financial protection, fintech compliance obligations, securities regulations, and the development of compliance programs for financial institutions and technology companies operating in regulated financial services markets.
GDPR Compliance
59LGuide development teams through General Data Protection Regulation requirements including data protection principles, consent management, Data Protection Officer obligations, breach notification procedures, and Data Protection Impact Assessments for organizations processing EU personal data.
HIPAA Compliance
59LGuide organizations through Health Insurance Portability and Accountability Act requirements including Protected Health Information handling, covered entity and business associate obligations, administrative and technical safeguards, breach reporting under the HITECH Act, and compliance program development for healthcare technology.
OSHA Workplace Safety Compliance
59LGuide organizations through Occupational Safety and Health Administration requirements including hazard communication standards, injury and illness recordkeeping, inspection and citation procedures, safety training obligations, and the development of comprehensive workplace safety programs across general industry and construction sectors.
SOX Compliance
59LGuide organizations through Sarbanes-Oxley Act requirements including internal controls over financial reporting, Section 404 management assessments, auditor independence standards, whistleblower protections, and corporate governance obligations for publicly traded companies.
Compliance Mapping
172LCompliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA
Executive Summary Writing
182LExecutive summary writing and non-technical security communication
Findings Documentation
177LClear vulnerability findings documentation with reproducible steps and evidence handling
Remediation Mapping
198LRemediation mapping, fix prioritization, and timeline estimation
Severity Scoring and Risk Rating
186LCVSS scoring, risk rating methodology, and business impact assessment
Computer Vision Robotics
60LSkill for implementing computer vision pipelines on robotic platforms, covering
Drone Programming
61LSkill for developing software for autonomous drones using ArduPilot, PX4,
Embedded Systems
62LSkill for developing embedded firmware for robotic systems on ARM microcontrollers,
Industrial Automation
61LSkill for designing and programming industrial automation systems including PLC
IoT Devices
61LSkill for developing IoT device firmware and systems using MQTT, ESP32, sensor
Motor Control
61LSkill for designing and implementing motor control systems including stepper
Path Planning
61LSkill for implementing path planning and motion planning algorithms for robots,
Robot Arm Kinematics
61LSkill for implementing forward and inverse kinematics for robotic manipulators,
ROS Robotics
64LSkill for developing robotic systems using ROS2, covering node architecture,
Sensor Integration
60LSkill for integrating and fusing data from robotic sensor suites including IMUs,
Change Safety Guardrails
180LChange safety guardrails for security testing, do-not-touch asset protection, and rollback planning
Legal Authorization and Rules of Engagement
170LLegal authorization verification, rules of engagement compliance, and regulatory awareness for security testing
Proof-Only Mode Testing
153LNon-destructive vulnerability validation, proof-of-concept without exploitation, and safe evidence collection
Safe Testing Rate Limits
153LSafe testing rate limits, resource-aware scanning, and production disruption avoidance
Scope Enforcement
149LScope enforcement for penetration testing, authorized target validation, and boundary compliance