Browse Skills
Building Threat Hunt Hypothesis Framework
v1.0.0Build a systematic threat hunt hypothesis framework that transforms threat intelligence, attack patterns, and environmental data into testable hunting hypotheses.
Building Threat Intelligence Enrichment In Splunk
v1.0.0Build automated threat intelligence enrichment pipelines in Splunk Enterprise Security using lookup tables, modular inputs, and the Threat Intelligence Framework.
Building Vulnerability Dashboard With Defectdojo
v1.0.0Deploy DefectDojo as a centralized vulnerability management dashboard with scanner integrations, deduplication, metrics tracking, and Jira ticketing workflows.
Bypassing Authentication With Forced Browsing
v1.0.0Discovering and accessing unprotected pages, APIs, and administrative interfaces by enumerating URLs and bypassing authentication controls during authorized security assessments.
Conducting Api Security Testing
v1.0.0>
Conducting Cloud Incident Response
v1.0.0>
Conducting Cloud Infrastructure Penetration Test
v1.0.0Perform a cloud infrastructure penetration test across AWS, Azure, and GCP to identify IAM misconfigurations, exposed storage buckets, insecure serverless functions, and cloud-native attack paths using Pacu, ScoutSuite, and Prowler.
Conducting Cloud Penetration Testing
v1.0.0>
Conducting Full Scope Red Team Engagement
v1.0.0Plan and execute a comprehensive red team engagement covering reconnaissance through post-exploitation using MITRE ATT&CK-aligned TTPs to evaluate an organization's detection and response capabilities.
Conducting Internal Reconnaissance With Bloodhound Ce
v1.0.0Conduct internal Active Directory reconnaissance using BloodHound Community Edition to map attack paths, identify privilege escalation chains, and discover misconfigurations in domain environments.
Conducting Malware Incident Response
v1.0.0>
Conducting Man In The Middle Attack Simulation
v1.0.0>