Browse Skills
Performing Active Directory Penetration Test
v1.0.0Conduct a focused Active Directory penetration test to enumerate domain objects, discover attack paths with BloodHound, exploit Kerberos weaknesses, escalate privileges via ADCS/DCSync, and demonstrate domain compromise.
Performing Active Directory Vulnerability Assessment
v1.0.0Assess Active Directory security posture using PingCastle, BloodHound, and Purple Knight to identify misconfigurations, privilege escalation paths, and attack vectors.
Performing Alert Triage With Elastic Siem
v1.0.0Perform systematic alert triage in Elastic Security SIEM to rapidly classify, prioritize, and investigate security alerts for SOC operations.
Performing Api Security Testing With Postman
v1.0.0>
Performing Arp Spoofing Attack Simulation
v1.0.0>
Performing Authenticated Vulnerability Scan
v1.0.0Authenticated (credentialed) vulnerability scanning uses valid system credentials to log into target hosts and perform deep inspection of installed software, patches, configurations, and security sett
Performing Automated Malware Analysis With Cape
v1.0.0Deploy and operate CAPEv2 sandbox for automated malware analysis with behavioral monitoring, payload extraction, configuration parsing, and anti-evasion capabilities.
Performing Aws Account Enumeration With Scout Suite
v1.0.0Perform comprehensive security posture assessment of AWS accounts using ScoutSuite to enumerate resources, identify misconfigurations, and generate actionable security reports.
Performing Bandwidth Throttling Attack Simulation
v1.0.0>
Performing Bluetooth Security Assessment
v1.0.0Assess Bluetooth Low Energy device security by scanning, enumerating GATT services, and detecting vulnerabilities
Performing Brand Monitoring For Impersonation
v1.0.0Monitor for brand impersonation attacks across domains, social media, mobile apps, and dark web channels to detect phishing campaigns, fake sites, and unauthorized brand usage targeting your organization.
Performing Clickjacking Attack Test
v1.0.0Testing web applications for clickjacking vulnerabilities by assessing frame embedding controls and crafting proof-of-concept overlay attacks during authorized security assessments.