Browse Skills
Performing Cloud Forensics With Aws Cloudtrail
v1.0.0Perform forensic investigation of AWS environments using CloudTrail logs to reconstruct attacker activity, identify compromised credentials, and analyze API call patterns.
Performing Cloud Forensics Investigation
v1.0.0Conduct forensic investigations in cloud environments by collecting and analyzing logs, snapshots, and metadata from AWS, Azure, and GCP services.
Performing Cloud Asset Inventory With Cartography
v1.0.0Perform comprehensive cloud asset inventory and relationship mapping using Cartography to build a Neo4j security graph of infrastructure assets, IAM permissions, and attack paths across AWS, GCP, and Azure.
Performing Clickjacking Attack Test
v1.0.0Testing web applications for clickjacking vulnerabilities by assessing frame embedding controls and crafting proof-of-concept overlay attacks during authorized security assessments.
Performing Brand Monitoring For Impersonation
v1.0.0Monitor for brand impersonation attacks across domains, social media, mobile apps, and dark web channels to detect phishing campaigns, fake sites, and unauthorized brand usage targeting your organization.
Performing Bluetooth Security Assessment
v1.0.0Assess Bluetooth Low Energy device security by scanning, enumerating GATT services, and detecting vulnerabilities
Performing Blind Ssrf Exploitation
v1.0.0Detect and exploit blind Server-Side Request Forgery vulnerabilities using out-of-band techniques, DNS interactions, and timing analysis to access internal services and cloud metadata endpoints.
Performing Binary Exploitation Analysis
v1.0.0>
Performing Bandwidth Throttling Attack Simulation
v1.0.0>
Performing Aws Privilege Escalation Assessment
v1.0.0>
Performing Aws Account Enumeration With Scout Suite
v1.0.0Perform comprehensive security posture assessment of AWS accounts using ScoutSuite to enumerate resources, identify misconfigurations, and generate actionable security reports.
Performing Automated Malware Analysis With Cape
v1.0.0Deploy and operate CAPEv2 sandbox for automated malware analysis with behavioral monitoring, payload extraction, configuration parsing, and anti-evasion capabilities.