Browse Skills

Performing Cloud Asset Inventory With Cartography

v1.0.0

Perform comprehensive cloud asset inventory and relationship mapping using Cartography to build a Neo4j security graph of infrastructure assets, IAM permissions, and attack paths across AWS, GCP, and Azure.

mukul975
4

Performing Cloud Incident Containment Procedures

v1.0.0

Execute cloud-native incident containment across AWS, Azure, and GCP by isolating compromised resources, revoking credentials, preserving forensic evidence, and applying security group restrictions to prevent lateral movement.

mukul975
6

Performing Cloud Penetration Testing

v1.0.0

>

mukul975
2

Performing Cloud Penetration Testing With Pacu

v1.0.0

>

mukul975
5

Performing Container Security Scanning With Trivy

v1.0.0

Scan container images, filesystems, and Kubernetes manifests for vulnerabilities, misconfigurations, exposed secrets, and license compliance issues using Aqua Security Trivy with SBOM generation and CI/CD integration.

mukul975
4

Performing Content Security Policy Bypass

v1.0.0

Analyze and bypass Content Security Policy implementations to achieve cross-site scripting by exploiting misconfigurations, JSONP endpoints, unsafe directives, and policy injection techniques.

mukul975
3

Performing Cryptographic Audit Of Application

v1.0.0

A cryptographic audit systematically reviews an application's use of cryptographic primitives, protocols, and key management to identify vulnerabilities such as weak algorithms, insecure modes, hardco

mukul975
6

Performing Csrf Attack Simulation

v1.0.0

Testing web applications for Cross-Site Request Forgery vulnerabilities by crafting forged requests that exploit authenticated user sessions during authorized security assessments.

mukul975
3

Performing Cve Prioritization With Kev Catalog

v1.0.0

Leverage the CISA Known Exploited Vulnerabilities catalog alongside EPSS and CVSS to prioritize CVE remediation based on real-world exploitation evidence.

mukul975
6

Performing Directory Traversal Testing

v1.0.0

Testing web applications for path traversal vulnerabilities that allow reading or writing arbitrary files on the server by manipulating file path parameters.

mukul975
4

Performing Docker Bench Security Assessment

v1.0.0

Docker Bench for Security is an open-source script that checks dozens of common best practices around deploying Docker containers in production. Based on the CIS Docker Benchmark, it audits host confi

mukul975
5

Hunting For Dns Based Persistence

v1.0.0

Hunt for DNS-based persistence mechanisms including DNS hijacking, dangling CNAME records, wildcard DNS abuse, and unauthorized zone modifications using passive DNS databases, SecurityTrails API, and DNS audit log analysis.

mukul975
3