Skip to main content

Database

Browse 4,557 skills across 394 packs and 37 categories

Showing 2761–2820 of 4,557 skills
4,557 skills found

legal-authorization

170L

Legal authorization verification, rules of engagement compliance, and regulatory awareness for security testing

Technology & EngineeringSafety Scope Guard

proof-only-mode

153L

Non-destructive vulnerability validation, proof-of-concept without exploitation, and safe evidence collection

Technology & EngineeringSafety Scope Guard

rate-limiting-safety

153L

Safe testing rate limits, resource-aware scanning, and production disruption avoidance

Technology & EngineeringSafety Scope Guard

scope-enforcement

149L

Scope enforcement for penetration testing, authorized target validation, and boundary compliance

Technology & EngineeringSafety Scope Guard

awareness-gaps

193L

Security awareness gap assessment, training effectiveness measurement, and human risk quantification

Technology & EngineeringSocial Engineering Readiness

helpdesk-abuse

191L

Helpdesk abuse path identification, pretexting scenarios, and identity verification bypass testing

Technology & EngineeringSocial Engineering Readiness

phishing-simulation

176L

Phishing simulation campaign planning, pretext development, payload design, and metrics collection

Technology & EngineeringSocial Engineering Readiness

physical-security

211L

Physical security assessment, tailgating testing, badge cloning awareness, and facility access review

Technology & EngineeringSocial Engineering Readiness

process-weakness

185L

Business process weakness identification, verification flow testing, and social engineering attack path analysis

Technology & EngineeringSocial Engineering Readiness

awareness-program-design

57L

Build and measure security awareness programs with baseline assessments, simulated attacks, and behavior change metrics

Technology & EngineeringSocial Engineering

mfa-bypass-testing

55L

Test MFA resilience through authorized adversary-in-the-middle, push fatigue, and recovery code exposure assessments

Technology & EngineeringSocial Engineering

phishing-campaign-design

58L

Design and execute authorized phishing simulation campaigns with GoPhish and King Phisher

Technology & EngineeringSocial Engineering

physical-social-engineering

57L

Conduct authorized physical social engineering assessments including tailgating, impersonation, and USB drops

Technology & EngineeringSocial Engineering

pretexting

56L

Develop and deploy pretexts for authorized social engineering engagements using structured methodology

Technology & EngineeringSocial Engineering

smishing

56L

Design and execute authorized SMS phishing simulations with proper consent and opt-out controls

Technology & EngineeringSocial Engineering

social-engineering-reporting

57L

Report social engineering assessment findings with metrics, human factor analysis, and executive-ready remediation plans

Technology & EngineeringSocial Engineering

spear-phishing

55L

Execute targeted spear-phishing simulations for authorized red team engagements with OSINT-driven pretexts

Technology & EngineeringSocial Engineering

vishing

55L

Conduct authorized voice phishing assessments against helpdesks and personnel targets

Technology & EngineeringSocial Engineering

watering-hole-assessment

55L

Simulate watering hole attacks in controlled environments to test browser security and web filtering controls

Technology & EngineeringSocial Engineering

adversary-emulation

47L

Map adversary behaviors to ATT&CK, emulate tactics, and validate detection coverage

Technology & EngineeringThreat Intel Agent

ioc-management

47L

IOC collection, enrichment, scoring, lifecycle management, and sharing via STIX/TAXII

Technology & EngineeringThreat Intel Agent

malware-triage

48L

Static and behavioral malware triage, config extraction, family clustering, and sandbox analysis

Technology & EngineeringThreat Intel Agent

threat-actor-tracking

49L

Track threat actors, campaigns, infrastructure patterns, and targeting trends

Technology & EngineeringThreat Intel Agent

threat-landscape

47L

Threat landscape analysis, trend reporting, and strategic risk forecasting

Technology & EngineeringThreat Intel Agent

access-control

141L

Authorization testing, privilege escalation, and IDOR detection for authorized security assessments

Technology & EngineeringWeb Appsec Agent

api-security-testing

163L

API auth flows, rate limiting, schema validation, and GraphQL security testing for authorized assessments

Technology & EngineeringWeb Appsec Agent

auth-testing

145L

Authentication review, credential handling, and session management testing for authorized assessments

Technology & EngineeringWeb Appsec Agent

business-logic

166L

Business logic flaw detection, race conditions, and workflow bypass testing for authorized assessments

Technology & EngineeringWeb Appsec Agent

input-validation

147L

XSS, SQLi, command injection, and template injection testing for authorized security assessments

Technology & EngineeringWeb Appsec Agent

web-config-review

156L

Security headers, CORS, CSP, cookie flags, and TLS configuration review for authorized assessments

Technology & EngineeringWeb Appsec Agent

bluetooth-review

142L

Bluetooth and BLE security assessment, pairing weakness analysis, sniffing, and device enumeration

Technology & EngineeringWireless Iot Agent

guest-network

136L

Guest network isolation testing, captive portal bypass, and visitor network security assessment

Technology & EngineeringWireless Iot Agent

home-network

140L

Home and small business network security assessment, router posture, smart device review, and WFH security

Technology & EngineeringWireless Iot Agent

iot-exposure

137L

IoT device exposure assessment, default credential testing, firmware review, and protocol analysis

Technology & EngineeringWireless Iot Agent

wifi-assessment

134L

Wi-Fi security configuration review, WPA enterprise testing, rogue AP detection, and wireless attack surface analysis

Technology & EngineeringWireless Iot Agent

brand-mention-monitoring

46L

Monitor mentions of brands, domains, and employee emails across dark web sources

Technology & EngineeringDark Web Monitoring

leak-site-monitoring

46L

Ransomware leak-site monitoring, extortion workflow tracking, and victim notification

Technology & EngineeringDark Web Monitoring

tor-ecosystem-awareness

46L

Onion service structure, abuse patterns, hosting indicators, and scam typologies

Technology & EngineeringDark Web Monitoring

underground-market-research

48L

Study productized crime trends including access sales, stealer logs, and fraud services (research-only)

Technology & EngineeringDark Web Monitoring

credential-leak-detection

46L

Detect credential leaks, stealer-log references, and breach monitoring for organizational accounts

Technology & EngineeringLeak Exposure Monitoring

data-exposure-analysis

46L

Detect customer data mentions, PII exposure, and data dump analysis for breach assessment

Technology & EngineeringLeak Exposure Monitoring

executive-exposure-review

48L

Assess doxxing risk, credential reuse, and public digital footprint for high-risk individuals

Technology & EngineeringLeak Exposure Monitoring

source-code-exposure

47L

Detect source code exposure, config dumps, and secret leaks in public repositories

Technology & EngineeringLeak Exposure Monitoring

supply-chain-monitoring

48L

Monitor for typosquat packages, dependency abuse, malicious updates, and fake repositories

Technology & EngineeringLeak Exposure Monitoring

app-sideload-abuse

48L

Detect app sideload abuse, marketplace scams, and unauthorized application distribution

Technology & EngineeringBrand Protection

brand-monitoring-automation

49L

Automated brand monitoring, alert triage, and takedown workflow orchestration

Technology & EngineeringBrand Protection

counterfeit-detection

47L

Detect counterfeit sites, pirated applications, and fake login portals impersonating your brand

Technology & EngineeringBrand Protection

ransomware-readiness

48L

Ransomware resilience testing, backup validation, recovery planning, and readiness assessment

Technology & EngineeringBrand Protection

brand-abuse-detection

46L

Detect fake domains, spoofed support channels, and counterfeit sites impersonating your brand

Technology & EngineeringFraud Impersonation

crypto-wallet-risk

46L

Wallet clustering, scam campaign tracking, sanction screening, and payment flow review

Technology & EngineeringFraud Impersonation

deception-testing

47L

Deploy honey assets, canary tokens, decoy credentials, and sinkhole infrastructure for threat detection

Technology & EngineeringFraud Impersonation

phishing-intelligence

47L

Phishing kit tracking, lure analysis, sender clustering, and landing page fingerprinting

Technology & EngineeringFraud Impersonation

social-impersonation

47L

Detect fake social accounts, executive impersonation, and marketplace fraud impersonation

Technology & EngineeringFraud Impersonation

business-email-compromise

55L

Simulate BEC attacks to test financial controls, authorization procedures, and executive impersonation defenses

Technology & EngineeringHuman Factor Security

credential-harvesting

57L

Build authorized credential harvesting pages for phishing simulations using GoPhish, Evilginx, and transparent proxies

Technology & EngineeringHuman Factor Security

deepfake-awareness

55L

Build organizational awareness and verification procedures against deepfake voice, video, and AI-generated content threats

Technology & EngineeringHuman Factor Security

helpdesk-exploitation

55L

Test helpdesk and IT support social engineering resilience through authorized identity verification bypass assessments

Technology & EngineeringHuman Factor Security

insider-threat-assessment

55L

Assess insider threat program maturity through gap analysis of behavioral indicators, DLP, and access controls

Technology & EngineeringHuman Factor Security

red-team-social-engineering

58L

Execute full-scope red team social engineering campaigns combining email, phone, physical, and technical vectors

Technology & EngineeringHuman Factor Security

social-media-reconnaissance

55L

Conduct social media OSINT for authorized engagements to map organizational exposure and employee data leakage

Technology & EngineeringHuman Factor Security