Database
Browse 4,557 skills across 394 packs and 37 categories
ad-security
157LActive Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments
iam-policy-review
164LIAM policy analysis and least privilege assessment for authorized security assessments
mfa-coverage
155LMFA coverage assessment and bypass risk detection for authorized security assessments
privilege-escalation
168LPrivilege escalation path detection in cloud and enterprise environments for authorized assessments
role-trust-boundaries
157LRole trust boundaries, cross-account access, and federation security review for authorized assessments
secret-management
163LSecret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments
attribution-support
48LAlias clustering, language patterns, infrastructure reuse, and confidence-rated attribution
decentralized-threat-research
46LP2P abuse monitoring, wallet-linked fraud, smart contract risk, and cross-platform correlation
domain-correlation
47LCorrelate domains, certificates, IPs, and ASNs across adversary campaigns
incident-enrichment
48LTransform raw security alerts into actor hypotheses, motives, next steps, and containment guidance
osint-fusion
49LMerge public web, breach data, passive DNS, social graph, and code repository intelligence
endpoint-visibility
130LEndpoint visibility gap analysis, rogue device detection, and EDR coverage assessment for internal networks
lateral-movement
118LLateral movement path analysis, credential relay, and pivot detection for authorized internal network assessments
legacy-protocol-risk
121LLegacy protocol risk assessment for SMBv1, LLMNR, NetBIOS, Telnet, and other deprecated services
segmentation-review
134LNetwork segmentation validation, VLAN hopping, firewall rule review, and micro-segmentation testing
trust-relationships
111LDomain trust enumeration, shared service abuse, and cross-boundary attack path analysis for authorized assessments
app-transport
155LApp transport security assessment, certificate pinning validation, HSTS enforcement, and TLS configuration review
local-storage
158LMobile local storage security review, keychain/keystore assessment, and sensitive data exposure detection
mobile-api-testing
185LMobile API interception, proxy configuration, request manipulation, and backend API security testing
reverse-engineering
165LAPK and IPA decompilation, binary analysis, obfuscation review, and tampering detection assessment
token-persistence
162LMobile token persistence analysis, session management review, and authentication state security
host-discovery
124LHost availability detection and network segmentation mapping for authorized security assessments
network-exposure
138LExposure validation and firewall rule assessment for authorized security assessments
port-scanning
124LPort discovery and service detection with nmap for authorized security assessments
protocol-identification
141LProtocol fingerprinting and unusual service detection for authorized security assessments
traffic-analysis
145LPacket capture interpretation, cleartext detection, and traffic analysis with tcpdump and Wireshark
tunneling-validation
140LSecure tunneling validation, proxy path review, and VPN configuration checks for authorized assessments
credential-attacks
45LCredential attack techniques for authorized assessments including password spraying, Kerberoasting, NTLM relay, and credential dumping
defense-evasion-testing
45LTesting detection coverage through AMSI bypass, process injection, and living-off-the-land techniques for detection validation
initial-access
45LInitial access techniques for authorized penetration tests including phishing, exposed services, and credential attacks
lateral-movement-techniques
45LLateral movement techniques for authorized assessments including pass-the-hash, WMI, PSExec, and RDP pivoting
payload-development
46LCustom payload development for authorized assessments including AV/EDR testing and C2 framework usage
persistence-analysis
46LPersistence mechanism testing for authorized assessments covering scheduled tasks, registry keys, services, and DLL side-loading
privilege-escalation-techniques
46LWindows and Linux privilege escalation techniques for authorized penetration testing including kernel exploits, misconfigurations, and token abuse
ad-attack-paths
46LActive Directory attack path analysis using BloodHound, Certify, and Rubeus for authorized security assessments
attack-infrastructure
45LAttack infrastructure setup including redirectors, domain fronting assessment, and phishing infrastructure for authorized engagements
c2-framework
45LCommand and control framework setup and operation for authorized penetration tests with OPSEC considerations
cloud-exploitation
45LCloud exploitation techniques for authorized assessments covering metadata abuse, SSRF to cloud, and IAM role assumption
debrief-retesting
47LClient debrief methodology, remediation validation, retest procedures, and knowledge transfer for penetration testing engagements
report-writing
46LProfessional penetration test report writing covering executive summary, technical findings, risk ratings, and remediation guidance
engagement-planning
48LRules of engagement definition, scope documentation, authorization validation, and legal compliance for penetration testing
external-pentest
46LExternal network penetration testing methodology aligned with PTES for authorized security assessments
internal-pentest
45LInternal network penetration testing and assumed breach methodology for authorized security assessments
physical-pentest
45LPhysical penetration testing methodology including access control bypass, tailgating assessment, and social engineering for authorized engagements
purple-team
45LPurple team exercise methodology for cooperative adversary simulation and detection validation in authorized engagements
red-team-operations
45LRed team engagement methodology covering objective-based adversary simulation and stealth assessment for authorized operations
web-app-pentest
47LWeb application penetration testing aligned with the OWASP Testing Guide for authorized security assessments
wireless-pentest
45LWireless network penetration testing covering WPA/WPA2/WPA3 assessment and rogue access point detection for authorized engagements
asn-ip-mapping
102LASN/IP range awareness, WHOIS lookups, and BGP route analysis for authorized security assessments
asset-discovery
99LAsset discovery, DNS enumeration, and subdomain mapping for authorized security assessments
attack-surface-mapping
129LExternal attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments
certificate-analysis
131LCertificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments
osint-gathering
119LOpen source intelligence collection, data leak checks, and metadata extraction for authorized assessments
service-inventory
114LService inventory and technology fingerprinting for authorized security assessments
compliance-mapping
172LCompliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA
executive-summary
182LExecutive summary writing and non-technical security communication
findings-documentation
177LClear vulnerability findings documentation with reproducible steps and evidence handling
remediation-mapping
198LRemediation mapping, fix prioritization, and timeline estimation
severity-scoring
186LCVSS scoring, risk rating methodology, and business impact assessment
change-safety
180LChange safety guardrails for security testing, do-not-touch asset protection, and rollback planning