Browse Skills
Performing Authenticated Scan With Openvas
v1.0.0Configure and execute authenticated vulnerability scans using OpenVAS/Greenbone Vulnerability Management with SSH and SMB credentials for comprehensive host-level assessment.
Performing Aws Privilege Escalation Assessment
v1.0.0>
Performing Binary Exploitation Analysis
v1.0.0>
Performing Blind Ssrf Exploitation
v1.0.0Detect and exploit blind Server-Side Request Forgery vulnerabilities using out-of-band techniques, DNS interactions, and timing analysis to access internal services and cloud metadata endpoints.
Performing Cloud Forensics Investigation
v1.0.0Conduct forensic investigations in cloud environments by collecting and analyzing logs, snapshots, and metadata from AWS, Azure, and GCP services.
Performing Container Escape Detection
v1.0.0>
Performing Container Image Hardening
v1.0.0>
Performing Credential Access With Lazagne
v1.0.0Extract stored credentials from compromised endpoints using the LaZagne post-exploitation tool to recover passwords from browsers, databases, system vaults, and applications during authorized red team operations.
Performing Dark Web Monitoring For Threats
v1.0.0Dark web monitoring involves systematically scanning Tor hidden services, underground forums, paste sites, and dark web marketplaces to identify threats targeting an organization, including leaked cre
Performing Deception Technology Deployment
v1.0.0>
Performing Disk Forensics Investigation
v1.0.0>
Performing Dns Enumeration And Zone Transfer
v1.0.0>