Browse Skills

Implementing Gcp Organization Policy Constraints

v1.0.0

Implement GCP Organization Policy constraints to enforce security guardrails across the entire resource hierarchy, restricting risky configurations and ensuring compliance at organization, folder, and project levels.

mukul975
4

Implementing Gcp Binary Authorization

v1.0.0

Implement GCP Binary Authorization to enforce deploy-time security controls that ensure only trusted, attested container images are deployed to Google Kubernetes Engine and Cloud Run.

mukul975
5

Implementing Fuzz Testing In Cicd With Aflplusplus

v1.0.0

Integrate AFL++ coverage-guided fuzz testing into CI/CD pipelines to discover memory corruption, input handling, and logic vulnerabilities in C/C++ and compiled applications.

mukul975
2

Implementing File Integrity Monitoring With Aide

v1.0.0

Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation, scheduled integrity checks, change detection, and alerting

mukul975
4

Implementing Epss Score For Vulnerability Prioritization

v1.0.0

Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based on real-world exploitation probability within 30 days.

mukul975
3

Implementing Envelope Encryption With Aws Kms

v1.0.0

Envelope encryption is a strategy where data is encrypted with a data encryption key (DEK), and the DEK itself is encrypted with a master key (KEK) managed by AWS KMS. This approach allows encrypting

mukul975
6

Implementing Endpoint Dlp Controls

v1.0.0

>

mukul975
4

Implementing Endpoint Detection With Wazuh

v1.0.0

Deploy and configure Wazuh SIEM/XDR for endpoint detection including agent management, custom decoder and rule XML creation, alert querying via the Wazuh REST API, and automated response actions.

mukul975
2

Implementing End To End Encryption For Messaging

v1.0.0

End-to-end encryption (E2EE) ensures that only the communicating parties can read messages, with no intermediary (including the server) able to decrypt them. This skill implements a simplified version

mukul975
5

Implementing Email Security With Dmarc Dkim Spf

v1.0.0

>-

mukul975
6

Implementing Email Sandboxing With Proofpoint

v1.0.0

Email sandboxing detonates suspicious attachments and URLs in isolated environments to detect zero-day malware and evasive phishing payloads. Proofpoint Targeted Attack Protection (TAP) is an industry

mukul975
3

Implementing Dragos Platform For Ot Monitoring

v1.0.0

>

mukul975
2