Browse Skills
Performing Ssl Certificate Lifecycle Management
v1.0.0SSL/TLS certificate lifecycle management encompasses the full process of requesting, issuing, deploying, monitoring, renewing, and revoking X.509 certificates. Poor certificate management is a leading
Performing Ssrf Vulnerability Exploitation
v1.0.0>-
Performing Static Malware Analysis With Pe Studio
v1.0.0>
Performing Steganography Detection
v1.0.0Detect and extract hidden data embedded in images, audio, and other media files using steganalysis tools to uncover covert communication channels.
Performing Threat Emulation With Atomic Red Team
v1.0.0>
Performing Threat Hunting With Elastic Siem
v1.0.0>
Performing Threat Hunting With Yara Rules
v1.0.0>
Performing Threat Intelligence Sharing With Misp
v1.0.0Use PyMISP to create, enrich, and share threat intelligence events on a MISP platform, including IOC management, feed integration, STIX export, and community sharing workflows.
Performing Timeline Reconstruction With Plaso
v1.0.0Build comprehensive forensic super-timelines using Plaso (log2timeline) to correlate events across file systems, logs, and artifacts into a unified chronological view.
Performing Vulnerability Scanning With Nessus
v1.0.0>
Performing Web Application Penetration Test
v1.0.0>
Performing Web Application Scanning With Nikto
v1.0.0Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous files/programs, checks for outdated versions of over 1,250 servers, and identifies ve