Browse Skills
Performing Privilege Escalation On Linux
v1.0.0Linux privilege escalation involves elevating from a low-privilege user account to root access on a compromised system. Red teams exploit misconfigurations, vulnerable services, kernel exploits, and w
Performing Privilege Escalation Assessment
v1.0.0>
Performing Power Grid Cybersecurity Assessment
v1.0.0>
Performing Plc Firmware Security Analysis
v1.0.0>
Performing Physical Intrusion Assessment
v1.0.0Conduct authorized physical penetration testing using tailgating, badge cloning, lock bypassing, and rogue device deployment to evaluate facility security controls.
Performing Phishing Simulation With Gophish
v1.0.0GoPhish is an open-source phishing simulation framework used by security teams to conduct authorized phishing awareness campaigns. It provides campaign management, email template creation, landing pag
Performing Paste Site Monitoring For Credentials
v1.0.0Monitor paste sites like Pastebin and GitHub Gists for leaked credentials, API keys, and sensitive data dumps using automated scraping and keyword matching to detect breaches early.
Performing Packet Injection Attack
v1.0.0>
Performing Ot Vulnerability Scanning Safely
v1.0.0>
Performing Ot Vulnerability Assessment With Claroty
v1.0.0>
Performing Ot Network Security Assessment
v1.0.0>
Performing Osint With Spiderfoot
v1.0.0Automate OSINT collection using SpiderFoot REST API and CLI for target profiling, module-based reconnaissance, and structured result analysis across 200+ data sources