Browse Skills
Performing Second Order Sql Injection
v1.0.0Detect and exploit second-order SQL injection vulnerabilities where malicious input is stored in a database and later executed in an unsafe SQL query during a different application operation.
Performing Scada Hmi Security Assessment
v1.0.0>
Performing Sca Dependency Scanning With Snyk
v1.0.0>
Performing S7comm Protocol Security Analysis
v1.0.0>
Performing Red Team With Covenant
v1.0.0Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener setup, grunt deployment, task execution, and lateral movement tracking.
Performing Red Team Phishing With Gophish
v1.0.0>-
Performing Ransomware Tabletop Exercise
v1.0.0>
Performing Ransomware Response
v1.0.0>
Performing Ransomware Incident Response
v1.0.0Execute a structured ransomware incident response including containment, decryption assessment, recovery from backups, and eradication of ransomware persistence mechanisms.
Performing Purple Team Exercise
v1.0.0>
Performing Privileged Account Discovery
v1.0.0Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local admins, service accounts, database admins, cloud IAM roles, and application admin account
Performing Privileged Account Access Review
v1.0.0Conduct systematic reviews of privileged accounts to validate access rights, identify excessive permissions, and enforce least privilege across PAM infrastructure.