Database
Browse 4,557 skills across 394 packs and 37 categories
legal-authorization
170LLegal authorization verification, rules of engagement compliance, and regulatory awareness for security testing
proof-only-mode
153LNon-destructive vulnerability validation, proof-of-concept without exploitation, and safe evidence collection
rate-limiting-safety
153LSafe testing rate limits, resource-aware scanning, and production disruption avoidance
scope-enforcement
149LScope enforcement for penetration testing, authorized target validation, and boundary compliance
awareness-gaps
193LSecurity awareness gap assessment, training effectiveness measurement, and human risk quantification
helpdesk-abuse
191LHelpdesk abuse path identification, pretexting scenarios, and identity verification bypass testing
phishing-simulation
176LPhishing simulation campaign planning, pretext development, payload design, and metrics collection
physical-security
211LPhysical security assessment, tailgating testing, badge cloning awareness, and facility access review
process-weakness
185LBusiness process weakness identification, verification flow testing, and social engineering attack path analysis
awareness-program-design
57LBuild and measure security awareness programs with baseline assessments, simulated attacks, and behavior change metrics
mfa-bypass-testing
55LTest MFA resilience through authorized adversary-in-the-middle, push fatigue, and recovery code exposure assessments
phishing-campaign-design
58LDesign and execute authorized phishing simulation campaigns with GoPhish and King Phisher
physical-social-engineering
57LConduct authorized physical social engineering assessments including tailgating, impersonation, and USB drops
pretexting
56LDevelop and deploy pretexts for authorized social engineering engagements using structured methodology
smishing
56LDesign and execute authorized SMS phishing simulations with proper consent and opt-out controls
social-engineering-reporting
57LReport social engineering assessment findings with metrics, human factor analysis, and executive-ready remediation plans
spear-phishing
55LExecute targeted spear-phishing simulations for authorized red team engagements with OSINT-driven pretexts
vishing
55LConduct authorized voice phishing assessments against helpdesks and personnel targets
watering-hole-assessment
55LSimulate watering hole attacks in controlled environments to test browser security and web filtering controls
adversary-emulation
47LMap adversary behaviors to ATT&CK, emulate tactics, and validate detection coverage
ioc-management
47LIOC collection, enrichment, scoring, lifecycle management, and sharing via STIX/TAXII
malware-triage
48LStatic and behavioral malware triage, config extraction, family clustering, and sandbox analysis
threat-actor-tracking
49LTrack threat actors, campaigns, infrastructure patterns, and targeting trends
threat-landscape
47LThreat landscape analysis, trend reporting, and strategic risk forecasting
access-control
141LAuthorization testing, privilege escalation, and IDOR detection for authorized security assessments
api-security-testing
163LAPI auth flows, rate limiting, schema validation, and GraphQL security testing for authorized assessments
auth-testing
145LAuthentication review, credential handling, and session management testing for authorized assessments
business-logic
166LBusiness logic flaw detection, race conditions, and workflow bypass testing for authorized assessments
input-validation
147LXSS, SQLi, command injection, and template injection testing for authorized security assessments
web-config-review
156LSecurity headers, CORS, CSP, cookie flags, and TLS configuration review for authorized assessments
bluetooth-review
142LBluetooth and BLE security assessment, pairing weakness analysis, sniffing, and device enumeration
guest-network
136LGuest network isolation testing, captive portal bypass, and visitor network security assessment
home-network
140LHome and small business network security assessment, router posture, smart device review, and WFH security
iot-exposure
137LIoT device exposure assessment, default credential testing, firmware review, and protocol analysis
wifi-assessment
134LWi-Fi security configuration review, WPA enterprise testing, rogue AP detection, and wireless attack surface analysis
brand-mention-monitoring
46LMonitor mentions of brands, domains, and employee emails across dark web sources
leak-site-monitoring
46LRansomware leak-site monitoring, extortion workflow tracking, and victim notification
tor-ecosystem-awareness
46LOnion service structure, abuse patterns, hosting indicators, and scam typologies
underground-market-research
48LStudy productized crime trends including access sales, stealer logs, and fraud services (research-only)
credential-leak-detection
46LDetect credential leaks, stealer-log references, and breach monitoring for organizational accounts
data-exposure-analysis
46LDetect customer data mentions, PII exposure, and data dump analysis for breach assessment
executive-exposure-review
48LAssess doxxing risk, credential reuse, and public digital footprint for high-risk individuals
source-code-exposure
47LDetect source code exposure, config dumps, and secret leaks in public repositories
supply-chain-monitoring
48LMonitor for typosquat packages, dependency abuse, malicious updates, and fake repositories
app-sideload-abuse
48LDetect app sideload abuse, marketplace scams, and unauthorized application distribution
brand-monitoring-automation
49LAutomated brand monitoring, alert triage, and takedown workflow orchestration
counterfeit-detection
47LDetect counterfeit sites, pirated applications, and fake login portals impersonating your brand
ransomware-readiness
48LRansomware resilience testing, backup validation, recovery planning, and readiness assessment
brand-abuse-detection
46LDetect fake domains, spoofed support channels, and counterfeit sites impersonating your brand
crypto-wallet-risk
46LWallet clustering, scam campaign tracking, sanction screening, and payment flow review
deception-testing
47LDeploy honey assets, canary tokens, decoy credentials, and sinkhole infrastructure for threat detection
phishing-intelligence
47LPhishing kit tracking, lure analysis, sender clustering, and landing page fingerprinting
social-impersonation
47LDetect fake social accounts, executive impersonation, and marketplace fraud impersonation
business-email-compromise
55LSimulate BEC attacks to test financial controls, authorization procedures, and executive impersonation defenses
credential-harvesting
57LBuild authorized credential harvesting pages for phishing simulations using GoPhish, Evilginx, and transparent proxies
deepfake-awareness
55LBuild organizational awareness and verification procedures against deepfake voice, video, and AI-generated content threats
helpdesk-exploitation
55LTest helpdesk and IT support social engineering resilience through authorized identity verification bypass assessments
insider-threat-assessment
55LAssess insider threat program maturity through gap analysis of behavioral indicators, DLP, and access controls
red-team-social-engineering
58LExecute full-scope red team social engineering campaigns combining email, phone, physical, and technical vectors
social-media-reconnaissance
55LConduct social media OSINT for authorized engagements to map organizational exposure and employee data leakage