Browse Skills
Performing Packet Injection Attack
v1.0.0>
Performing Paste Site Monitoring For Credentials
v1.0.0Monitor paste sites like Pastebin and GitHub Gists for leaked credentials, API keys, and sensitive data dumps using automated scraping and keyword matching to detect breaches early.
Performing Phishing Simulation With Gophish
v1.0.0GoPhish is an open-source phishing simulation framework used by security teams to conduct authorized phishing awareness campaigns. It provides campaign management, email template creation, landing pag
Performing Physical Intrusion Assessment
v1.0.0Conduct authorized physical penetration testing using tailgating, badge cloning, lock bypassing, and rogue device deployment to evaluate facility security controls.
Performing Plc Firmware Security Analysis
v1.0.0>
Performing Ransomware Incident Response
v1.0.0Execute a structured ransomware incident response including containment, decryption assessment, recovery from backups, and eradication of ransomware persistence mechanisms.
Performing S7comm Protocol Security Analysis
v1.0.0>
Performing Sca Dependency Scanning With Snyk
v1.0.0>
Performing Scada Hmi Security Assessment
v1.0.0>
Performing Security Headers Audit
v1.0.0Auditing HTTP security headers including CSP, HSTS, X-Frame-Options, and cookie attributes to identify missing or misconfigured browser-level protections.
Performing Serverless Function Security Review
v1.0.0>
Performing Service Account Audit
v1.0.0Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant accounts. This skill covers discovery of service accounts in Active Directory, cloud pl