Browse Skills
Performing Ip Reputation Analysis With Shodan
v1.0.0Analyze IP address reputation using the Shodan API to identify open ports, running services, known vulnerabilities, and hosting context for threat intelligence enrichment and incident triage.
Performing Jwt None Algorithm Attack
v1.0.0Execute and test the JWT none algorithm attack to bypass signature verification by manipulating the alg header field in JSON Web Tokens.
Performing Kerberoasting Attack
v1.0.0Kerberoasting is a post-exploitation technique that targets service accounts in Active Directory by requesting Kerberos TGS (Ticket Granting Service) tickets for accounts with Service Principal Names
Performing Kubernetes Cis Benchmark With Kube Bench
v1.0.0Audit Kubernetes cluster security posture against CIS benchmarks using kube-bench with automated checks for control plane, worker nodes, and RBAC.
Performing Kubernetes Etcd Security Assessment
v1.0.0Assess the security posture of Kubernetes etcd clusters by evaluating encryption at rest, TLS configuration, access controls, backup encryption, and network isolation.
Performing Kubernetes Penetration Testing
v1.0.0Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against the API server, kubelet, etcd, pods, RBAC, network policies, and secrets. Using tools
Performing Log Analysis For Forensic Investigation
v1.0.0Collect, parse, and correlate system, application, and security logs to reconstruct events and establish timelines during forensic investigations.
Performing Log Source Onboarding In Siem
v1.0.0Perform structured log source onboarding into SIEM platforms by configuring collectors, parsers, normalization, and validation for complete security visibility.
Performing Malware Hash Enrichment With Virustotal
v1.0.0Enrich malware file hashes using the VirusTotal API to retrieve detection rates, behavioral analysis, YARA matches, and contextual threat intelligence for incident triage and IOC validation.
Performing Network Traffic Analysis With Zeek
v1.0.0Deploy Zeek network security monitor to capture, parse, and analyze network traffic metadata for threat detection, anomaly identification, and forensic investigation.
Performing Open Source Intelligence Gathering
v1.0.0Open Source Intelligence (OSINT) gathering is the first active phase of a red team engagement, where operators collect publicly available information about the target organization to identify attack s
Performing Ot Network Security Assessment
v1.0.0>