Browse Skills
Performing Authenticated Vulnerability Scan
v1.0.0Authenticated (credentialed) vulnerability scanning uses valid system credentials to log into target hosts and perform deep inspection of installed software, patches, configurations, and security sett
Performing Authenticated Scan With Openvas
v1.0.0Configure and execute authenticated vulnerability scans using OpenVAS/Greenbone Vulnerability Management with SSH and SMB credentials for comprehensive host-level assessment.
Performing Asset Criticality Scoring For Vulns
v1.0.0Develop and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization based on business impact, data sensitivity, and operational importance.
Performing Arp Spoofing Attack Simulation
v1.0.0>
Performing Api Security Testing With Postman
v1.0.0>
Performing Api Rate Limiting Bypass
v1.0.0>
Performing Api Inventory And Discovery
v1.0.0>
Performing Api Fuzzing With Restler
v1.0.0>
Performing Android App Static Analysis With Mobsf
v1.0.0>
Performing Alert Triage With Elastic Siem
v1.0.0Perform systematic alert triage in Elastic Security SIEM to rapidly classify, prioritize, and investigate security alerts for SOC operations.
Performing Agentless Vulnerability Scanning
v1.0.0Configure and execute agentless vulnerability scanning using network protocols, cloud snapshot analysis, and API-based discovery to assess systems without installing endpoint agents.
Performing Adversary In The Middle Phishing Detection
v1.0.0Detect and respond to Adversary-in-the-Middle (AiTM) phishing attacks that use reverse proxy kits like EvilProxy, Evilginx, and Tycoon 2FA to bypass MFA and steal session tokens.