Browse Skills
Performing Sqlite Database Forensics
v1.0.0Perform forensic analysis of SQLite databases to recover deleted records from freelists and WAL files, decode encoded timestamps, and extract evidence from browser history, messaging apps, and mobile device databases.
Performing Thick Client Application Penetration Test
v1.0.0Conduct a thick client application penetration test to identify insecure local storage, hardcoded credentials, DLL hijacking, memory manipulation, and insecure API communication in desktop applications using dnSpy, Procmon, and Burp Suite.
Implementing Api Abuse Detection With Rate Limiting
v1.0.0Implement API abuse detection using token bucket, sliding window, and adaptive rate limiting algorithms to prevent DDoS, brute force, and credential stuffing attacks.
Implementing Api Rate Limiting And Throttling
v1.0.0>
Implementing Code Signing For Artifacts
v1.0.0>
Implementing Diamond Model Analysis
v1.0.0The Diamond Model of Intrusion Analysis provides a structured framework for analyzing cyber intrusions by examining four core features: Adversary, Capability, Infrastructure, and Victim. This skill co
Implementing Epss Score For Vulnerability Prioritization
v1.0.0Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based on real-world exploitation probability within 30 days.
Implementing Mobile Application Management
v1.0.0>
Implementing Policy As Code With Open Policy Agent
v1.0.0>
Implementing Privileged Identity Management With Azure
v1.0.0Configure Azure AD Privileged Identity Management (PIM) using Microsoft Graph API to manage eligible role assignments, just-in-time activation, access reviews, and role management policies for zero-trust privileged access.
Intercepting Mobile Traffic With Burpsuite
v1.0.0>
Performing Agentless Vulnerability Scanning
v1.0.0Configure and execute agentless vulnerability scanning using network protocols, cloud snapshot analysis, and API-based discovery to assess systems without installing endpoint agents.