Browse Skills

Performing Authenticated Vulnerability Scan

v1.0.0

Authenticated (credentialed) vulnerability scanning uses valid system credentials to log into target hosts and perform deep inspection of installed software, patches, configurations, and security sett

mukul975
3

Performing Authenticated Scan With Openvas

v1.0.0

Configure and execute authenticated vulnerability scans using OpenVAS/Greenbone Vulnerability Management with SSH and SMB credentials for comprehensive host-level assessment.

mukul975
3

Performing Asset Criticality Scoring For Vulns

v1.0.0

Develop and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization based on business impact, data sensitivity, and operational importance.

mukul975
4

Performing Arp Spoofing Attack Simulation

v1.0.0

>

mukul975
4

Performing Api Security Testing With Postman

v1.0.0

>

mukul975
3

Performing Api Rate Limiting Bypass

v1.0.0

>

mukul975
4

Performing Api Inventory And Discovery

v1.0.0

>

mukul975
3

Performing Api Fuzzing With Restler

v1.0.0

>

mukul975
4

Performing Android App Static Analysis With Mobsf

v1.0.0

>

mukul975
4

Performing Alert Triage With Elastic Siem

v1.0.0

Perform systematic alert triage in Elastic Security SIEM to rapidly classify, prioritize, and investigate security alerts for SOC operations.

mukul975
2

Performing Agentless Vulnerability Scanning

v1.0.0

Configure and execute agentless vulnerability scanning using network protocols, cloud snapshot analysis, and API-based discovery to assess systems without installing endpoint agents.

mukul975
3

Performing Adversary In The Middle Phishing Detection

v1.0.0

Detect and respond to Adversary-in-the-Middle (AiTM) phishing attacks that use reverse proxy kits like EvilProxy, Evilginx, and Tycoon 2FA to bypass MFA and steal session tokens.

mukul975
3