Browse Skills
Deploying Software Defined Perimeter
v1.0.0Deploying Software Defined Perimeter
Detecting Anomalies In Industrial Control Systems
v1.0.0>
Detecting Anomalous Authentication Patterns
v1.0.0>
Detecting Arp Poisoning In Network Traffic
v1.0.0Detect and prevent ARP spoofing attacks using ARPWatch, Dynamic ARP Inspection, Wireshark analysis, and custom monitoring scripts to protect against man-in-the-middle interception.
Detecting Attacks On Historian Servers
v1.0.0>
Detecting Attacks On Scada Systems
v1.0.0>
Detecting Aws Credential Exposure With Trufflehog
v1.0.0>
Detecting Aws Iam Privilege Escalation
v1.0.0Detect AWS IAM privilege escalation paths using boto3 and Cloudsplaining policy analysis to identify overly permissive policies, dangerous permission combinations, and least-privilege violations
Detecting Azure Service Principal Abuse
v1.0.0Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin consent bypass, and unauthorized enumeration in Microsoft Entra ID environments.
Detecting Beaconing Patterns With Zeek
v1.0.0>
Detecting Broken Object Property Level Authorization
v1.0.0Detect and test for OWASP API3:2023 Broken Object Property Level Authorization vulnerabilities including excessive data exposure and mass assignment attacks.
Detecting Cloud Cryptomining Activity
v1.0.0>