Browse Skills
Performing Endpoint Forensics Investigation
v1.0.0>
Performing Dynamic Analysis With Any Run
v1.0.0>
Performing Dynamic Analysis Of Android App
v1.0.0>
Performing Docker Bench Security Assessment
v1.0.0Docker Bench for Security is an open-source script that checks dozens of common best practices around deploying Docker containers in production. Based on the CIS Docker Benchmark, it audits host confi
Performing Dns Tunneling Detection
v1.0.0>
Performing Dns Enumeration And Zone Transfer
v1.0.0>
Performing Dmarc Policy Enforcement Rollout
v1.0.0Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring all legitimate email sources are authenticated before blocking unauthorized senders.
Performing Disk Forensics Investigation
v1.0.0>
Performing Directory Traversal Testing
v1.0.0Testing web applications for path traversal vulnerabilities that allow reading or writing arbitrary files on the server by manipulating file path parameters.
Performing Deception Technology Deployment
v1.0.0>
Performing Dark Web Monitoring For Threats
v1.0.0Dark web monitoring involves systematically scanning Tor hidden services, underground forums, paste sites, and dark web marketplaces to identify threats targeting an organization, including leaked cre
Performing Cve Prioritization With Kev Catalog
v1.0.0Leverage the CISA Known Exploited Vulnerabilities catalog alongside EPSS and CVSS to prioritize CVE remediation based on real-world exploitation evidence.