Skip to main content

Database

Browse 4,557 skills across 394 packs and 37 categories

Showing 2701–2760 of 4,557 skills
4,557 skills found

ad-security

157L

Active Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments

Technology & EngineeringIdentity Iam Agent

iam-policy-review

164L

IAM policy analysis and least privilege assessment for authorized security assessments

Technology & EngineeringIdentity Iam Agent

mfa-coverage

155L

MFA coverage assessment and bypass risk detection for authorized security assessments

Technology & EngineeringIdentity Iam Agent

privilege-escalation

168L

Privilege escalation path detection in cloud and enterprise environments for authorized assessments

Technology & EngineeringIdentity Iam Agent

role-trust-boundaries

157L

Role trust boundaries, cross-account access, and federation security review for authorized assessments

Technology & EngineeringIdentity Iam Agent

secret-management

163L

Secret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments

Technology & EngineeringIdentity Iam Agent

attribution-support

48L

Alias clustering, language patterns, infrastructure reuse, and confidence-rated attribution

Technology & EngineeringInfrastructure Correlation

decentralized-threat-research

46L

P2P abuse monitoring, wallet-linked fraud, smart contract risk, and cross-platform correlation

Technology & EngineeringInfrastructure Correlation

domain-correlation

47L

Correlate domains, certificates, IPs, and ASNs across adversary campaigns

Technology & EngineeringInfrastructure Correlation

incident-enrichment

48L

Transform raw security alerts into actor hypotheses, motives, next steps, and containment guidance

Technology & EngineeringInfrastructure Correlation

osint-fusion

49L

Merge public web, breach data, passive DNS, social graph, and code repository intelligence

Technology & EngineeringInfrastructure Correlation

endpoint-visibility

130L

Endpoint visibility gap analysis, rogue device detection, and EDR coverage assessment for internal networks

Technology & EngineeringInternal Network Agent

lateral-movement

118L

Lateral movement path analysis, credential relay, and pivot detection for authorized internal network assessments

Technology & EngineeringInternal Network Agent

legacy-protocol-risk

121L

Legacy protocol risk assessment for SMBv1, LLMNR, NetBIOS, Telnet, and other deprecated services

Technology & EngineeringInternal Network Agent

segmentation-review

134L

Network segmentation validation, VLAN hopping, firewall rule review, and micro-segmentation testing

Technology & EngineeringInternal Network Agent

trust-relationships

111L

Domain trust enumeration, shared service abuse, and cross-boundary attack path analysis for authorized assessments

Technology & EngineeringInternal Network Agent

app-transport

155L

App transport security assessment, certificate pinning validation, HSTS enforcement, and TLS configuration review

Technology & EngineeringMobile Client Security

local-storage

158L

Mobile local storage security review, keychain/keystore assessment, and sensitive data exposure detection

Technology & EngineeringMobile Client Security

mobile-api-testing

185L

Mobile API interception, proxy configuration, request manipulation, and backend API security testing

Technology & EngineeringMobile Client Security

reverse-engineering

165L

APK and IPA decompilation, binary analysis, obfuscation review, and tampering detection assessment

Technology & EngineeringMobile Client Security

token-persistence

162L

Mobile token persistence analysis, session management review, and authentication state security

Technology & EngineeringMobile Client Security

host-discovery

124L

Host availability detection and network segmentation mapping for authorized security assessments

Technology & EngineeringNetwork Mapper Agent

network-exposure

138L

Exposure validation and firewall rule assessment for authorized security assessments

Technology & EngineeringNetwork Mapper Agent

port-scanning

124L

Port discovery and service detection with nmap for authorized security assessments

Technology & EngineeringNetwork Mapper Agent

protocol-identification

141L

Protocol fingerprinting and unusual service detection for authorized security assessments

Technology & EngineeringNetwork Mapper Agent

traffic-analysis

145L

Packet capture interpretation, cleartext detection, and traffic analysis with tcpdump and Wireshark

Technology & EngineeringNetwork Mapper Agent

tunneling-validation

140L

Secure tunneling validation, proxy path review, and VPN configuration checks for authorized assessments

Technology & EngineeringNetwork Mapper Agent

credential-attacks

45L

Credential attack techniques for authorized assessments including password spraying, Kerberoasting, NTLM relay, and credential dumping

Technology & EngineeringPentest Exploitation

defense-evasion-testing

45L

Testing detection coverage through AMSI bypass, process injection, and living-off-the-land techniques for detection validation

Technology & EngineeringPentest Exploitation

initial-access

45L

Initial access techniques for authorized penetration tests including phishing, exposed services, and credential attacks

Technology & EngineeringPentest Exploitation

lateral-movement-techniques

45L

Lateral movement techniques for authorized assessments including pass-the-hash, WMI, PSExec, and RDP pivoting

Technology & EngineeringPentest Exploitation

payload-development

46L

Custom payload development for authorized assessments including AV/EDR testing and C2 framework usage

Technology & EngineeringPentest Exploitation

persistence-analysis

46L

Persistence mechanism testing for authorized assessments covering scheduled tasks, registry keys, services, and DLL side-loading

Technology & EngineeringPentest Exploitation

privilege-escalation-techniques

46L

Windows and Linux privilege escalation techniques for authorized penetration testing including kernel exploits, misconfigurations, and token abuse

Technology & EngineeringPentest Exploitation

ad-attack-paths

46L

Active Directory attack path analysis using BloodHound, Certify, and Rubeus for authorized security assessments

Technology & EngineeringPentest Infrastructure

attack-infrastructure

45L

Attack infrastructure setup including redirectors, domain fronting assessment, and phishing infrastructure for authorized engagements

Technology & EngineeringPentest Infrastructure

c2-framework

45L

Command and control framework setup and operation for authorized penetration tests with OPSEC considerations

Technology & EngineeringPentest Infrastructure

cloud-exploitation

45L

Cloud exploitation techniques for authorized assessments covering metadata abuse, SSRF to cloud, and IAM role assumption

Technology & EngineeringPentest Infrastructure

debrief-retesting

47L

Client debrief methodology, remediation validation, retest procedures, and knowledge transfer for penetration testing engagements

Technology & EngineeringPentest Infrastructure

report-writing

46L

Professional penetration test report writing covering executive summary, technical findings, risk ratings, and remediation guidance

Technology & EngineeringPentest Infrastructure

engagement-planning

48L

Rules of engagement definition, scope documentation, authorization validation, and legal compliance for penetration testing

Technology & EngineeringPentest Methodology

external-pentest

46L

External network penetration testing methodology aligned with PTES for authorized security assessments

Technology & EngineeringPentest Methodology

internal-pentest

45L

Internal network penetration testing and assumed breach methodology for authorized security assessments

Technology & EngineeringPentest Methodology

physical-pentest

45L

Physical penetration testing methodology including access control bypass, tailgating assessment, and social engineering for authorized engagements

Technology & EngineeringPentest Methodology

purple-team

45L

Purple team exercise methodology for cooperative adversary simulation and detection validation in authorized engagements

Technology & EngineeringPentest Methodology

red-team-operations

45L

Red team engagement methodology covering objective-based adversary simulation and stealth assessment for authorized operations

Technology & EngineeringPentest Methodology

web-app-pentest

47L

Web application penetration testing aligned with the OWASP Testing Guide for authorized security assessments

Technology & EngineeringPentest Methodology

wireless-pentest

45L

Wireless network penetration testing covering WPA/WPA2/WPA3 assessment and rogue access point detection for authorized engagements

Technology & EngineeringPentest Methodology

asn-ip-mapping

102L

ASN/IP range awareness, WHOIS lookups, and BGP route analysis for authorized security assessments

Technology & EngineeringRecon Agent

asset-discovery

99L

Asset discovery, DNS enumeration, and subdomain mapping for authorized security assessments

Technology & EngineeringRecon Agent

attack-surface-mapping

129L

External attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments

Technology & EngineeringRecon Agent

certificate-analysis

131L

Certificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments

Technology & EngineeringRecon Agent

osint-gathering

119L

Open source intelligence collection, data leak checks, and metadata extraction for authorized assessments

Technology & EngineeringRecon Agent

service-inventory

114L

Service inventory and technology fingerprinting for authorized security assessments

Technology & EngineeringRecon Agent

compliance-mapping

172L

Compliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA

Technology & EngineeringReporting Agent

executive-summary

182L

Executive summary writing and non-technical security communication

Technology & EngineeringReporting Agent

findings-documentation

177L

Clear vulnerability findings documentation with reproducible steps and evidence handling

Technology & EngineeringReporting Agent

remediation-mapping

198L

Remediation mapping, fix prioritization, and timeline estimation

Technology & EngineeringReporting Agent

severity-scoring

186L

CVSS scoring, risk rating methodology, and business impact assessment

Technology & EngineeringReporting Agent

change-safety

180L

Change safety guardrails for security testing, do-not-touch asset protection, and rollback planning

Technology & EngineeringSafety Scope Guard