Browse Skills
Securing Remote Access To Ot Environment
v1.0.0>
Securing Serverless Functions
v1.0.0>
Tracking Threat Actor Infrastructure
v1.0.0Threat actor infrastructure tracking involves monitoring and mapping adversary-controlled assets including command-and-control (C2) servers, phishing domains, exploit kit hosts, bulletproof hosting, a
Performing Endpoint Vulnerability Remediation
v1.0.0>
Performing Entitlement Review With Sailpoint Iiq
v1.0.0>
Performing External Network Penetration Test
v1.0.0Conduct a comprehensive external network penetration test to identify vulnerabilities in internet-facing infrastructure using PTES methodology, reconnaissance, scanning, exploitation, and reporting.
Performing False Positive Reduction In Siem
v1.0.0Perform systematic SIEM false positive reduction through rule tuning, threshold adjustment, correlation refinement, and threat intelligence enrichment to combat alert fatigue.
Performing File Carving With Foremost
v1.0.0Recover files from disk images and unallocated space using Foremost's header-footer signature carving to extract evidence regardless of file system state.
Performing Firmware Malware Analysis
v1.0.0>
Performing Fuzzing With Aflplusplus
v1.0.0>
Performing Ics Asset Discovery With Claroty
v1.0.0>
Performing Indicator Lifecycle Management
v1.0.0Indicator lifecycle management tracks IOCs from initial discovery through validation, enrichment, deployment, monitoring, and eventual retirement. This skill covers implementing systematic processes f