Browse Skills
Securing Api Gateway With Aws Waf
v1.0.0>
Triaging Vulnerabilities With Ssvc Framework
v1.0.0Triage and prioritize vulnerabilities using CISA's Stakeholder-Specific Vulnerability Categorization (SSVC) decision tree framework to produce actionable remediation priorities.
Performing Initial Access With Evilginx3
v1.0.0Perform authorized initial access using EvilGinx3 adversary-in-the-middle phishing framework to capture session tokens and bypass multi-factor authentication during red team engagements.
Performing Lateral Movement With Wmiexec
v1.0.0Perform lateral movement across Windows networks using WMI-based remote execution techniques including Impacket wmiexec.py, CrackMapExec, and native WMI commands for stealthy post-exploitation during red team engagements.
Performing Memory Forensics With Volatility3 Plugins
v1.0.0Analyze memory dumps using Volatility3 plugins to detect injected code, rootkits, credential theft, and malware artifacts in Windows, Linux, and macOS memory images.
Performing Mobile App Certificate Pinning Bypass
v1.0.0>
Performing Mobile Device Forensics With Cellebrite
v1.0.0Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications, location data, and application artifacts.
Performing Nist Csf Maturity Assessment
v1.0.0The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect,
Performing Osint With Spiderfoot
v1.0.0Automate OSINT collection using SpiderFoot REST API and CLI for target profiling, module-based reconnaissance, and structured result analysis across 200+ data sources
Performing Privileged Account Discovery
v1.0.0Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local admins, service accounts, database admins, cloud IAM roles, and application admin account
Performing Red Team With Covenant
v1.0.0Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener setup, grunt deployment, task execution, and lateral movement tracking.
Performing Second Order Sql Injection
v1.0.0Detect and exploit second-order SQL injection vulnerabilities where malicious input is stored in a database and later executed in an unsafe SQL query during a different application operation.