Marketplace
Leaderboard
How it works
Search
Ctrl K
Account
▾
Sign in
Submit a skill
→
BENCH ENGINE · IDLE
NEXT CYCLE · —:—:—
NEXT · —:—
NEXT CYCLE · —:—:—
Enter the Arena
→
Repository bundle
mukul975
/
Anthropic-Cybersecurity-Skills
762 skills · 0 CLAUDE.md · same GitHub repo on Versuz.
← Marketplace
Open on GitHub ↗
SKILL.md in this repo
acquiring-disk-image-with-dd-and-dcfldd
Other
View skill →
analyzing-active-directory-acl-abuse
Data
View skill →
analyzing-android-malware-with-apktool
Code
View skill →
analyzing-api-gateway-access-logs
DevOps
View skill →
analyzing-apt-group-with-mitre-navigator
Other
View skill →
analyzing-azure-activity-logs-for-threats
DevOps
View skill →
analyzing-bootkit-and-rootkit-samples
Other
View skill →
analyzing-browser-forensics-with-hindsight
Web
View skill →
analyzing-campaign-attribution-evidence
Marketing
View skill →
analyzing-certificate-transparency-for-phishing
Other
View skill →
analyzing-cloud-storage-access-patterns
DevOps
View skill →
analyzing-cobalt-strike-beacon-configuration
Other
View skill →
analyzing-cobaltstrike-malleable-c2-profiles
DevOps
View skill →
analyzing-command-and-control-communication
Document
View skill →
analyzing-cyber-kill-chain
Testing
View skill →
analyzing-cyber-kill-chain
Testing
View skill →
analyzing-disk-image-with-autopsy
Other
View skill →
analyzing-dns-logs-for-exfiltration
Shell
View skill →
analyzing-docker-container-forensics
Shell
View skill →
analyzing-email-headers-for-phishing-investigation
Other
View skill →
analyzing-ethereum-smart-contract-vulnerabilities
Other
View skill →
analyzing-golang-malware-with-ghidra
Code
View skill →
analyzing-heap-spray-exploitation
Other
View skill →
analyzing-indicators-of-compromise
SQL
View skill →
analyzing-ios-app-security-with-objection
Testing
View skill →
analyzing-kubernetes-audit-logs
DevOps
View skill →
analyzing-linux-audit-logs-for-intrusion
Shell
View skill →
analyzing-linux-elf-malware
DevOps
View skill →
analyzing-linux-kernel-rootkits
Other
View skill →
analyzing-linux-system-artifacts
Automation
View skill →
analyzing-lnk-file-and-jump-list-artifacts
Code
View skill →
analyzing-macro-malware-in-office-documents
Marketing
View skill →
analyzing-malicious-pdf-with-peepdf
Document
View skill →
analyzing-malicious-url-with-urlscan
SQL
View skill →
analyzing-malware-behavior-with-cuckoo-sandbox
Other
View skill →
analyzing-malware-family-relationships-with-malpedia
Research
View skill →
analyzing-malware-persistence-with-autoruns
Automation
View skill →
analyzing-malware-sandbox-evasion-techniques
Other
View skill →
analyzing-memory-dumps-with-volatility
SQL
View skill →
analyzing-memory-forensics-with-lime-and-volatility
SQL
View skill →
analyzing-mft-for-deleted-file-recovery
Other
View skill →
analyzing-network-covert-channels-in-malware
Shell
View skill →
analyzing-network-flow-data-with-netflow
Code
View skill →
analyzing-network-packets-with-scapy
Other
View skill →
analyzing-network-traffic-for-incidents
Other
View skill →
analyzing-network-traffic-of-malware
DevOps
View skill →
analyzing-network-traffic-with-wireshark
DevOps
View skill →
analyzing-office365-audit-logs-for-compromise
API integration
View skill →
analyzing-outlook-pst-for-email-forensics
DevOps
View skill →
analyzing-packed-malware-with-upx-unpacker
Other
View skill →
analyzing-pdf-malware-with-pdfid
Document
View skill →
analyzing-persistence-mechanisms-in-linux
DevOps
View skill →
analyzing-powershell-empire-artifacts
Shell
View skill →
analyzing-powershell-script-block-logging
Shell
View skill →
analyzing-prefetch-files-for-execution-history
Other
View skill →
analyzing-ransomware-encryption-mechanisms
Shell
View skill →
analyzing-ransomware-leak-site-intelligence
Other
View skill →
analyzing-ransomware-network-indicators
Other
View skill →
analyzing-ransomware-payment-wallets
Testing
View skill →
analyzing-sbom-for-supply-chain-vulnerabilities
Testing
View skill →
analyzing-security-logs-with-splunk
DevOps
View skill →
analyzing-slack-space-and-file-system-artifacts
Other
View skill →
analyzing-supply-chain-malware-artifacts
Testing
View skill →
analyzing-threat-actor-ttps-with-mitre-attack
Shell
View skill →
analyzing-threat-actor-ttps-with-mitre-navigator
Code
View skill →
analyzing-threat-intelligence-feeds
Marketing
View skill →
analyzing-threat-landscape-with-misp
Code
View skill →
analyzing-tls-certificate-transparency-logs
DevOps
View skill →
analyzing-typosquatting-domains-with-dnstwist
Other
View skill →
analyzing-uefi-bootkit-persistence
Testing
View skill →
analyzing-usb-device-connection-history
Other
View skill →
analyzing-web-server-logs-for-intrusion
DevOps
View skill →
analyzing-windows-amcache-artifacts
Other
View skill →
analyzing-windows-event-logs-in-splunk
Shell
View skill →
analyzing-windows-lnk-files-for-artifacts
Code
View skill →
analyzing-windows-prefetch-with-python
Code
View skill →
analyzing-windows-registry-for-artifacts
Other
View skill →
analyzing-windows-shellbag-artifacts
Other
View skill →
auditing-aws-s3-bucket-permissions
DevOps
View skill →
auditing-azure-active-directory-configuration
Web
View skill →
auditing-cloud-with-cis-benchmarks
DevOps
View skill →
auditing-gcp-iam-permissions
DevOps
View skill →
auditing-kubernetes-cluster-rbac
DevOps
View skill →
auditing-terraform-infrastructure-for-security
DevOps
View skill →
auditing-tls-certificate-transparency-logs
DevOps
View skill →
auditing-tls-certificate-transparency-logs
DevOps
View skill →
automating-ioc-enrichment
Code
View skill →
building-adversary-infrastructure-tracking-system
Other
View skill →
building-attack-pattern-library-from-cti-reports
Shell
View skill →
building-automated-malware-submission-pipeline
Other
View skill →
building-c2-infrastructure-with-sliver-framework
Other
View skill →
building-cloud-siem-with-sentinel
Data
View skill →
building-detection-rule-with-splunk-spl
Other
View skill →
building-detection-rules-with-sigma
Code
View skill →
building-devsecops-pipeline-with-gitlab-ci
Automation
View skill →
building-identity-federation-with-saml-azure-ad
DevOps
View skill →
building-identity-governance-lifecycle-process
Shell
View skill →
building-incident-response-dashboard
DevOps
View skill →
building-incident-response-playbook
DevOps
View skill →
building-incident-timeline-with-timesketch
Testing
View skill →
building-ioc-defanging-and-sharing-pipeline
SQL
View skill →
building-ioc-enrichment-pipeline-with-opencti
Other
View skill →
building-malware-incident-communication-template
Shell
View skill →
building-patch-tuesday-response-process
Shell
View skill →
building-phishing-reporting-button-workflow
Communication
View skill →
building-ransomware-playbook-with-cisa-framework
DevOps
View skill →
building-red-team-c2-infrastructure-with-havoc
Other
View skill →
building-role-mining-for-rbac-optimization
Data
View skill →
building-soc-escalation-matrix
Code
View skill →
building-soc-metrics-and-kpi-tracking
Other
View skill →
building-soc-playbook-for-ransomware
DevOps
View skill →
building-threat-actor-profile-from-osint
Other
View skill →
building-threat-feed-aggregation-with-misp
Code
View skill →
building-threat-hunt-hypothesis-framework
Research
View skill →
building-threat-intelligence-enrichment-in-splunk
Other
View skill →
building-threat-intelligence-feed-integration
DevOps
View skill →
building-threat-intelligence-platform
Other
View skill →
building-vulnerability-aging-and-sla-tracking
Shell
View skill →
building-vulnerability-dashboard-with-defectdojo
API integration
View skill →
building-vulnerability-exception-tracking-system
Other
View skill →
building-vulnerability-scanning-workflow
DevOps
View skill →
bypassing-authentication-with-forced-browsing
SQL
View skill →
collecting-indicators-of-compromise
Code
View skill →
collecting-open-source-intelligence
Web
View skill →
collecting-threat-intelligence-with-misp
Code
View skill →
collecting-volatile-evidence-from-compromised-host
Shell
View skill →
conducting-api-security-testing
Web
View skill →
conducting-cloud-incident-response
DevOps
View skill →
conducting-cloud-penetration-testing
Document
View skill →
conducting-domain-persistence-with-dcsync
Other
View skill →
conducting-external-reconnaissance-with-osint
Code
View skill →
conducting-full-scope-red-team-engagement
Other
View skill →
conducting-internal-network-penetration-test
Code
View skill →
conducting-internal-reconnaissance-with-bloodhound-ce
Testing
View skill →
conducting-malware-incident-response
SQL
View skill →
conducting-man-in-the-middle-attack-simulation
SQL
View skill →
conducting-memory-forensics-with-volatility
DevOps
View skill →
conducting-mobile-app-penetration-test
Other
View skill →
conducting-network-penetration-test
Other
View skill →
conducting-pass-the-ticket-attack
Other
View skill →
conducting-phishing-incident-response
SQL
View skill →
conducting-post-incident-lessons-learned
DevOps
View skill →
conducting-social-engineering-penetration-test
Marketing
View skill →
conducting-social-engineering-penetration-test
Marketing
View skill →
conducting-social-engineering-pretext-call
Other
View skill →
conducting-spearphishing-simulation-campaign
Marketing
View skill →
conducting-wireless-network-penetration-test
Other
View skill →
configuring-active-directory-tiered-model
Other
View skill →
configuring-aws-verified-access-for-ztna
Data
View skill →
configuring-certificate-authority-with-openssl
Code
View skill →
configuring-host-based-intrusion-detection
Shell
View skill →
configuring-hsm-for-key-storage
Other
View skill →
configuring-identity-aware-proxy-with-google-iap
DevOps
View skill →
configuring-ldap-security-hardening
Data
View skill →
configuring-microsegmentation-for-zero-trust
Code
View skill →
configuring-multi-factor-authentication-with-duo
DevOps
View skill →
configuring-network-segmentation-with-vlans
Data
View skill →
configuring-oauth2-authorization-flow
Other
View skill →
configuring-pfsense-firewall-rules
DevOps
View skill →
configuring-snort-ids-for-intrusion-detection
Other
View skill →
configuring-suricata-for-network-monitoring
DevOps
View skill →
configuring-tls-1-3-for-secure-communications
Other
View skill →
configuring-windows-defender-advanced-settings
Other
View skill →
configuring-windows-event-logging-for-detection
Other
View skill →
configuring-zscaler-private-access-for-ztna
Shell
View skill →
containing-active-breach
DevOps
View skill →
correlating-security-events-in-qradar
Other
View skill →
correlating-threat-campaigns
Marketing
View skill →
deobfuscating-javascript-malware
Code
View skill →
deobfuscating-powershell-obfuscated-malware
Shell
View skill →
deploying-active-directory-honeytokens
Shell
View skill →
deploying-cloudflare-access-for-zero-trust
Code
View skill →
deploying-decoy-files-for-ransomware-detection
SQL
View skill →
deploying-edr-agent-with-crowdstrike
Other
View skill →
deploying-osquery-for-endpoint-monitoring
DevOps
View skill →
deploying-palo-alto-prisma-access-zero-trust
SQL
View skill →
deploying-ransomware-canary-files
SQL
View skill →
deploying-software-defined-perimeter
Data
View skill →
deploying-tailscale-for-zero-trust-vpn
Code
View skill →
detecting-ai-model-prompt-injection-attacks
Shell
View skill →
detecting-anomalies-in-industrial-control-systems
Shell
View skill →
detecting-anomalous-authentication-patterns
Data
View skill →
detecting-api-enumeration-attacks
DevOps
View skill →
detecting-arp-poisoning-in-network-traffic
SQL
View skill →
detecting-attacks-on-historian-servers
Other
View skill →
detecting-attacks-on-scada-systems
SQL
View skill →
detecting-aws-cloudtrail-anomalies
Code
View skill →
detecting-aws-credential-exposure-with-trufflehog
Code
View skill →
detecting-aws-guardduty-findings-automation
DevOps
View skill →
detecting-aws-iam-privilege-escalation
Code
View skill →
detecting-azure-lateral-movement
DevOps
View skill →
detecting-azure-service-principal-abuse
DevOps
View skill →
detecting-azure-storage-account-misconfigurations
DevOps
View skill →
detecting-beaconing-patterns-with-zeek
Data
View skill →
detecting-bluetooth-low-energy-attacks
SQL
View skill →
detecting-broken-object-property-level-authorization
Other
View skill →
detecting-business-email-compromise
Code
View skill →
detecting-business-email-compromise-with-ai
Shell
View skill →
detecting-cloud-threats-with-guardduty
DevOps
View skill →
detecting-command-and-control-over-dns
Shell
View skill →
detecting-compromised-cloud-credentials
Shell
View skill →
detecting-container-drift-at-runtime
DevOps
View skill →
detecting-container-escape-attempts
DevOps
View skill →
detecting-container-escape-with-falco-rules
Code
View skill →
detecting-credential-dumping-techniques
Other
View skill →
detecting-cryptomining-in-cloud
DevOps
View skill →
detecting-dcsync-attack-in-active-directory
DevOps
View skill →
detecting-deepfake-audio-in-vishing-attacks
Shell
View skill →
detecting-dll-sideloading-attacks
Other
View skill →
detecting-dnp3-protocol-anomalies
DevOps
View skill →
detecting-dns-exfiltration-with-dns-query-analysis
DevOps
View skill →
detecting-email-account-compromise
API integration
View skill →
detecting-email-forwarding-rules-attack
Communication
View skill →
detecting-evasion-techniques-in-endpoint-logs
Shell
View skill →
detecting-exfiltration-over-dns-with-zeek
Shell
View skill →
detecting-fileless-attacks-on-endpoints
Shell
View skill →
detecting-fileless-malware-techniques
Shell
View skill →
detecting-golden-ticket-attacks-in-kerberos-logs
Other
View skill →
detecting-golden-ticket-forgery
Other
View skill →
detecting-insider-data-exfiltration-via-dlp
Data
View skill →
detecting-insider-threat-behaviors
Other
View skill →
detecting-insider-threat-with-ueba
Other
View skill →
detecting-kerberoasting-attacks
DevOps
View skill →
detecting-lateral-movement-in-network
Other
View skill →
detecting-lateral-movement-with-splunk
Other
View skill →
detecting-lateral-movement-with-zeek
Other
View skill →
detecting-living-off-the-land-attacks
Shell
View skill →
detecting-living-off-the-land-with-lolbas
Other
View skill →
detecting-malicious-scheduled-tasks-with-sysmon
Automation
View skill →
detecting-mimikatz-execution-patterns
Other
View skill →
detecting-misconfigured-azure-storage
DevOps
View skill →
detecting-mobile-malware-behavior
DevOps
View skill →
detecting-modbus-command-injection-attacks
DevOps
View skill →
detecting-modbus-protocol-anomalies
SQL
View skill →
detecting-network-anomalies-with-zeek
DevOps
View skill →
detecting-network-scanning-with-ids-signatures
Shell
View skill →
detecting-ntlm-relay-with-event-correlation
Data
View skill →
detecting-oauth-token-theft
DevOps
View skill →
detecting-pass-the-hash-attacks
SQL
View skill →
detecting-pass-the-ticket-attacks
Other
View skill →
detecting-port-scanning-with-fail2ban
DevOps
View skill →
detecting-privilege-escalation-attempts
Code
View skill →
detecting-privilege-escalation-in-kubernetes-pods
DevOps
View skill →
detecting-process-hollowing-technique
Other
View skill →
detecting-process-injection-techniques
DevOps
View skill →
detecting-qr-code-phishing-with-email-security
SQL
View skill →
detecting-ransomware-encryption-behavior
DevOps
View skill →
detecting-ransomware-precursors-in-network
DevOps
View skill →
detecting-rdp-brute-force-attacks
Data
View skill →
detecting-rootkit-activity
Shell
View skill →
detecting-s3-data-exfiltration-attempts
DevOps
View skill →
detecting-serverless-function-injection
DevOps
View skill →
detecting-service-account-abuse
Code
View skill →
detecting-shadow-api-endpoints
Other
View skill →
detecting-shadow-it-cloud-usage
Data
View skill →
detecting-spearphishing-with-email-gateway
Research
View skill →
detecting-sql-injection-via-waf-logs
Marketing
View skill →
detecting-stuxnet-style-attacks
Testing
View skill →
detecting-supply-chain-attacks-in-ci-cd
Testing
View skill →
detecting-suspicious-oauth-application-consent
Web
View skill →
detecting-suspicious-powershell-execution
Shell
View skill →
detecting-t1003-credential-dumping-with-edr
DevOps
View skill →
detecting-t1055-process-injection-with-sysmon
Other
View skill →
detecting-t1548-abuse-elevation-control-mechanism
DevOps
View skill →
detecting-typosquatting-packages-in-npm-pypi
Testing
View skill →
detecting-wmi-persistence
Other
View skill →
eradicating-malware-from-infected-systems
SQL
View skill →
evaluating-threat-intelligence-platforms
Automation
View skill →
executing-active-directory-attack-simulation
Code
View skill →
executing-phishing-simulation-campaign
Marketing
View skill →
executing-red-team-engagement-planning
Other
View skill →
executing-red-team-exercise
Other
View skill →
exploiting-active-directory-certificate-services-esc1
Code
View skill →
exploiting-active-directory-with-bloodhound
Shell
View skill →
exploiting-api-injection-vulnerabilities
Other
View skill →
exploiting-bgp-hijacking-vulnerabilities
DevOps
View skill →
exploiting-broken-function-level-authorization
Code
View skill →
exploiting-broken-link-hijacking
Other
View skill →
exploiting-constrained-delegation-abuse
Code
View skill →
exploiting-deeplink-vulnerabilities
Shell
View skill →
exploiting-excessive-data-exposure-in-api
Code
View skill →
exploiting-http-request-smuggling
Web
View skill →
exploiting-idor-vulnerabilities
SQL
View skill →
exploiting-insecure-data-storage-in-mobile
Testing
View skill →
exploiting-insecure-deserialization
Code
View skill →
exploiting-ipv6-vulnerabilities
Other
View skill →
exploiting-jwt-algorithm-confusion-attack
Data
View skill →
exploiting-kerberoasting-with-impacket
Other
View skill →
exploiting-mass-assignment-in-rest-apis
SQL
View skill →
exploiting-ms17-010-eternalblue-vulnerability
Other
View skill →
exploiting-nopac-cve-2021-42278-42287
Testing
View skill →
exploiting-nosql-injection-vulnerabilities
Other
View skill →
exploiting-oauth-misconfiguration
Other
View skill →
exploiting-prototype-pollution-in-javascript
Design
View skill →
exploiting-race-condition-vulnerabilities
SQL
View skill →
exploiting-server-side-request-forgery
SQL
View skill →
exploiting-smb-vulnerabilities-with-metasploit
Other
View skill →
exploiting-sql-injection-vulnerabilities
SQL
View skill →
exploiting-sql-injection-with-sqlmap
Other
View skill →
exploiting-template-injection-vulnerabilities
Other
View skill →
exploiting-type-juggling-vulnerabilities
Shell
View skill →
exploiting-vulnerabilities-with-metasploit-framework
Shell
View skill →
exploiting-websocket-vulnerabilities
Code
View skill →
exploiting-zerologon-vulnerability-cve-2020-1472
Data
View skill →
extracting-browser-history-artifacts
Code
View skill →
extracting-config-from-agent-tesla-rat
Communication
View skill →
extracting-credentials-from-memory-dump
Other
View skill →
extracting-iocs-from-malware-samples
SQL
View skill →
extracting-memory-artifacts-with-rekall
SQL
View skill →
extracting-windows-event-logs-artifacts
Testing
View skill →
generating-threat-intelligence-reports
Other
View skill →
hardening-docker-containers-for-production
Data
View skill →
hardening-docker-daemon-configuration
Other
View skill →
hardening-linux-endpoint-with-cis-benchmark
Data
View skill →
hardening-windows-endpoint-with-cis-benchmark
Data
View skill →
hunting-advanced-persistent-threats
Research
View skill →
hunting-credential-stuffing-attacks
Marketing
View skill →
hunting-for-anomalous-powershell-execution
Shell
View skill →
hunting-for-beaconing-with-frequency-analysis
Shell
View skill →
hunting-for-cobalt-strike-beacons
Code
View skill →
hunting-for-command-and-control-beaconing
Shell
View skill →
hunting-for-data-exfiltration-indicators
Other
View skill →
hunting-for-data-staging-before-exfiltration
DevOps
View skill →
hunting-for-dcom-lateral-movement
Shell
View skill →
hunting-for-dcsync-attacks
Other
View skill →
hunting-for-defense-evasion-via-timestomping
Code
View skill →
hunting-for-dns-based-persistence
Shell
View skill →
hunting-for-dns-tunneling-with-zeek
Other
View skill →
hunting-for-domain-fronting-c2-traffic
Other
View skill →
hunting-for-lateral-movement-via-wmi
Shell
View skill →
hunting-for-living-off-the-cloud-techniques
DevOps
View skill →
hunting-for-living-off-the-land-binaries
Other
View skill →
hunting-for-lolbins-execution-in-endpoint-logs
Shell
View skill →
hunting-for-ntlm-relay-attacks
Other
View skill →
hunting-for-persistence-mechanisms-in-windows
Other
View skill →
hunting-for-persistence-via-wmi-subscriptions
SQL
View skill →
hunting-for-process-injection-techniques
Other
View skill →
hunting-for-registry-persistence-mechanisms
Shell
View skill →
hunting-for-registry-run-key-persistence
Other
View skill →
hunting-for-scheduled-task-persistence
Automation
View skill →
hunting-for-shadow-copy-deletion
DevOps
View skill →
hunting-for-spearphishing-indicators
Marketing
View skill →
hunting-for-startup-folder-persistence
DevOps
View skill →
hunting-for-supply-chain-compromise
Testing
View skill →
hunting-for-suspicious-scheduled-tasks
Automation
View skill →
hunting-for-t1098-account-manipulation
Other
View skill →
hunting-for-unusual-network-connections
Other
View skill →
hunting-for-unusual-service-installations
Other
View skill →
hunting-for-webshell-activity
Other
View skill →
implementing-aes-encryption-for-data-at-rest
Shell
View skill →
implementing-alert-fatigue-reduction
DevOps
View skill →
implementing-anti-phishing-training-program
Other
View skill →
implementing-anti-ransomware-group-policy
Other
View skill →
implementing-api-abuse-detection-with-rate-limiting
Data
View skill →
implementing-api-abuse-detection-with-rate-limiting
Data
View skill →
implementing-api-gateway-security-controls
DevOps
View skill →
implementing-api-key-security-controls
Data
View skill →
implementing-api-rate-limiting-and-throttling
SQL
View skill →
implementing-api-schema-validation-security
Data
View skill →
implementing-api-security-posture-management
Data
View skill →
implementing-api-security-testing-with-42crunch
Web
View skill →
implementing-api-threat-protection-with-apigee
Other
View skill →
implementing-application-whitelisting-with-applocker
Data
View skill →
implementing-aqua-security-for-container-scanning
Automation
View skill →
implementing-attack-path-analysis-with-xm-cyber
Other
View skill →
implementing-attack-surface-management
macOS
View skill →
implementing-aws-config-rules-for-compliance
DevOps
View skill →
implementing-aws-iam-permission-boundaries
Data
View skill →
implementing-aws-macie-for-data-classification
DevOps
View skill →
implementing-aws-nitro-enclave-security
Shell
View skill →
implementing-aws-security-hub
Other
View skill →
implementing-aws-security-hub-compliance
Other
View skill →
implementing-azure-ad-privileged-identity-management
DevOps
View skill →
implementing-azure-defender-for-cloud
Other
View skill →
implementing-beyondcorp-zero-trust-access-model
Code
View skill →
implementing-bgp-security-with-rpki
Other
View skill →
implementing-browser-isolation-for-zero-trust
Code
View skill →
implementing-canary-tokens-for-network-intrusion
DevOps
View skill →
implementing-cisa-zero-trust-maturity-model
Code
View skill →
implementing-cloud-dlp-for-data-protection
DevOps
View skill →
implementing-cloud-security-posture-management
DevOps
View skill →
implementing-cloud-trail-log-analysis
DevOps
View skill →
implementing-cloud-vulnerability-posture-management
DevOps
View skill →
implementing-cloud-waf-rules
DevOps
View skill →
implementing-cloud-workload-protection
DevOps
View skill →
implementing-code-signing-for-artifacts
Testing
View skill →
implementing-conditional-access-policies-azure-ad
DevOps
View skill →
implementing-conduit-security-for-ot-remote-access
Shell
View skill →
implementing-container-image-minimal-base-with-distroless
Other
View skill →
implementing-container-network-policies-with-calico
DevOps
View skill →
implementing-continuous-security-validation-with-bas
Testing
View skill →
implementing-data-loss-prevention-with-microsoft-purview
API integration
View skill →
implementing-ddos-mitigation-with-cloudflare
Other
View skill →
implementing-deception-based-detection-with-canarytoken
Shell
View skill →
implementing-delinea-secret-server-for-pam
Shell
View skill →
implementing-device-posture-assessment-in-zero-trust
Code
View skill →
implementing-devsecops-security-scanning
Automation
View skill →
implementing-diamond-model-analysis
Other
View skill →
implementing-digital-signatures-with-ed25519
Other
View skill →
implementing-disk-encryption-with-bitlocker
Other
View skill →
implementing-dmarc-dkim-spf-email-security
Other
View skill →
implementing-dragos-platform-for-ot-monitoring
DevOps
View skill →
implementing-ebpf-security-monitoring
DevOps
View skill →
implementing-email-sandboxing-with-proofpoint
SQL
View skill →
implementing-end-to-end-encryption-for-messaging
Other
View skill →
implementing-endpoint-detection-with-wazuh
Web
View skill →
implementing-endpoint-dlp-controls
Other
View skill →
implementing-envelope-encryption-with-aws-kms
Other
View skill →
implementing-epss-score-for-vulnerability-prioritization
Document
View skill →
implementing-file-integrity-monitoring-with-aide
DevOps
View skill →
implementing-fuzz-testing-in-cicd-with-aflplusplus
Automation
View skill →
implementing-gcp-binary-authorization
DevOps
View skill →
implementing-gcp-organization-policy-constraints
SQL
View skill →
implementing-gcp-vpc-firewall-rules
DevOps
View skill →
implementing-gdpr-data-protection-controls
Other
View skill →
implementing-gdpr-data-subject-access-request
Writing
View skill →
implementing-github-advanced-security-for-code-scanning
Other
View skill →
implementing-google-workspace-admin-security
API integration
View skill →
implementing-google-workspace-phishing-protection
API integration
View skill →
implementing-google-workspace-sso-configuration
API integration
View skill →
implementing-hardware-security-key-authentication
Shell
View skill →
implementing-hashicorp-vault-dynamic-secrets
Other
View skill →
implementing-honeypot-for-ransomware-detection
SQL
View skill →
implementing-honeytokens-for-breach-detection
SQL
View skill →
implementing-ics-firewall-with-tofino
DevOps
View skill →
implementing-identity-governance-with-sailpoint
Marketing
View skill →
implementing-identity-verification-for-zero-trust
Code
View skill →
implementing-iec-62443-security-zones
DevOps
View skill →
implementing-image-provenance-verification-with-cosign
DevOps
View skill →
implementing-immutable-backup-with-restic
Data
View skill →
implementing-infrastructure-as-code-security-scanning
DevOps
View skill →
implementing-iso-27001-information-security-management
Code
View skill →
implementing-just-in-time-access-provisioning
Other
View skill →
implementing-jwt-signing-and-verification
Shell
View skill →
implementing-kubernetes-network-policy-with-calico
DevOps
View skill →
implementing-kubernetes-pod-security-standards
DevOps
View skill →
implementing-llm-guardrails-for-security
Code
View skill →
implementing-log-forwarding-with-fluentd
DevOps
View skill →
implementing-log-integrity-with-blockchain
Testing
View skill →
implementing-memory-protection-with-dep-aslr
Testing
View skill →
implementing-microsegmentation-with-guardicore
Data
View skill →
implementing-mimecast-targeted-attack-protection
Other
View skill →
implementing-mitre-attack-coverage-mapping
Other
View skill →
implementing-mobile-application-management
Data
View skill →
implementing-mtls-for-zero-trust-services
Code
View skill →
implementing-nerc-cip-compliance-controls
Testing
View skill →
implementing-network-access-control
Data
View skill →
implementing-network-access-control-with-cisco-ise
Other
View skill →
implementing-network-deception-with-honeypots
Other
View skill →
implementing-network-intrusion-prevention-with-suricata
Other
View skill →
implementing-network-policies-for-kubernetes
DevOps
View skill →
implementing-network-segmentation-for-ot
DevOps
View skill →
implementing-network-segmentation-with-firewall-zones
DevOps
View skill →
implementing-network-traffic-analysis-with-arkime
Other
View skill →
implementing-network-traffic-baselining
Data
View skill →
implementing-next-generation-firewall-with-palo-alto
DevOps
View skill →
implementing-opa-gatekeeper-for-policy-enforcement
Data
View skill →
implementing-ot-incident-response-playbook
DevOps
View skill →
implementing-ot-network-traffic-analysis-with-nozomi
DevOps
View skill →
implementing-pam-for-database-access
SQL
View skill →
implementing-passwordless-auth-with-microsoft-entra
Shell
View skill →
implementing-passwordless-authentication-with-fido2
Code
View skill →
implementing-patch-management-for-ot-systems
SQL
View skill →
implementing-patch-management-workflow
Other
View skill →
implementing-pci-dss-compliance-controls
Other
View skill →
implementing-pod-security-admission-controller
SQL
View skill →
implementing-policy-as-code-with-open-policy-agent
Automation
View skill →
implementing-privileged-access-management-with-cyberark
Other
View skill →
implementing-privileged-access-workstation
Code
View skill →
implementing-privileged-session-monitoring
DevOps
View skill →
implementing-proofpoint-email-security-gateway
Other
View skill →
implementing-purdue-model-network-segmentation
Data
View skill →
implementing-ransomware-backup-strategy
Other
View skill →
implementing-ransomware-kill-switch-detection
DevOps
View skill →
implementing-rapid7-insightvm-for-scanning
DevOps
View skill →
implementing-rbac-hardening-for-kubernetes
DevOps
View skill →
implementing-rsa-key-pair-management
Shell
View skill →
implementing-runtime-application-self-protection
Code
View skill →
implementing-runtime-security-with-tetragon
DevOps
View skill →
implementing-saml-sso-with-okta
Other
View skill →
implementing-scim-provisioning-with-okta
Other
View skill →
implementing-secret-scanning-with-gitleaks
Shell
View skill →
implementing-secrets-management-with-vault
Automation
View skill →
implementing-secrets-scanning-in-ci-cd
Automation
View skill →
implementing-security-chaos-engineering
DevOps
View skill →
implementing-security-information-sharing-with-stix2
Code
View skill →
implementing-security-monitoring-with-datadog
DevOps
View skill →
implementing-semgrep-for-custom-sast-rules
Shell
View skill →
implementing-siem-correlation-rules-for-apt
Testing
View skill →
implementing-siem-use-case-tuning
Other
View skill →
implementing-siem-use-cases-for-detection
Other
View skill →
implementing-sigstore-for-software-signing
Automation
View skill →
implementing-soar-automation-with-phantom
DevOps
View skill →
implementing-soar-playbook-for-phishing
SQL
View skill →
implementing-soar-playbook-with-palo-alto-xsoar
DevOps
View skill →
implementing-stix-taxii-feed-integration
Code
View skill →
implementing-supply-chain-security-with-in-toto
Testing
View skill →
implementing-syslog-centralization-with-rsyslog
Other
View skill →
implementing-taxii-server-with-opentaxii
Code
View skill →
implementing-threat-intelligence-lifecycle-management
Other
View skill →
implementing-threat-modeling-with-mitre-attack
Other
View skill →
implementing-ticketing-system-for-incidents
API integration
View skill →
implementing-usb-device-control-policy
Data
View skill →
implementing-velociraptor-for-ir-collection
macOS
View skill →
implementing-vulnerability-management-with-greenbone
DevOps
View skill →
implementing-vulnerability-remediation-sla
Shell
View skill →
implementing-vulnerability-sla-breach-alerting
DevOps
View skill →
implementing-web-application-logging-with-modsecurity
Other
View skill →
implementing-zero-knowledge-proof-for-authentication
Other
View skill →
implementing-zero-standing-privilege-with-cyberark
Other
View skill →
implementing-zero-trust-dns-with-nextdns
Code
View skill →
implementing-zero-trust-for-saas-applications
Code
View skill →
implementing-zero-trust-in-cloud
Code
View skill →
implementing-zero-trust-network-access
Code
View skill →
implementing-zero-trust-network-access-with-zscaler
Code
View skill →
implementing-zero-trust-with-beyondcorp
Code
View skill →
implementing-zero-trust-with-hashicorp-boundary
Code
View skill →
integrating-dast-with-owasp-zap-in-pipeline
Automation
View skill →
integrating-sast-into-github-actions-pipeline
Automation
View skill →
intercepting-mobile-traffic-with-burpsuite
Other
View skill →
investigating-insider-threat-indicators
Other
View skill →
investigating-phishing-email-incident
SQL
View skill →
investigating-ransomware-attack-artifacts
Other
View skill →
managing-cloud-identity-with-okta
Data
View skill →
managing-intelligence-lifecycle
Other
View skill →
mapping-mitre-attack-techniques
Shell
View skill →
monitoring-darkweb-sources
DevOps
View skill →
monitoring-scada-modbus-traffic-anomalies
DevOps
View skill →
performing-access-recertification-with-saviynt
Marketing
View skill →
performing-access-review-and-certification
Marketing
View skill →
performing-active-directory-bloodhound-analysis
Shell
View skill →
performing-active-directory-compromise-investigation
Other
View skill →
performing-active-directory-forest-trust-attack
Code
View skill →
performing-active-directory-penetration-test
Shell
View skill →
performing-active-directory-vulnerability-assessment
Code
View skill →
performing-adversary-in-the-middle-phishing-detection
SQL
View skill →
performing-agentless-vulnerability-scanning
DevOps
View skill →
performing-ai-driven-osint-correlation
Shell
View skill →
performing-alert-triage-with-elastic-siem
Other
View skill →
performing-android-app-static-analysis-with-mobsf
Automation
View skill →
performing-api-fuzzing-with-restler
Web
View skill →
performing-api-inventory-and-discovery
Code
View skill →
performing-api-inventory-and-discovery
Code
View skill →
performing-api-rate-limiting-bypass
SQL
View skill →
performing-api-security-testing-with-postman
Automation
View skill →
performing-arp-spoofing-attack-simulation
SQL
View skill →
performing-asset-criticality-scoring-for-vulns
Shell
View skill →
performing-authenticated-scan-with-openvas
DevOps
View skill →
performing-authenticated-vulnerability-scan
DevOps
View skill →
performing-automated-malware-analysis-with-cape
DevOps
View skill →
performing-aws-account-enumeration-with-scout-suite
Other
View skill →
performing-aws-privilege-escalation-assessment
Code
View skill →
performing-bandwidth-throttling-attack-simulation
DevOps
View skill →
performing-binary-exploitation-analysis
Testing
View skill →
performing-blind-ssrf-exploitation
DevOps
View skill →
performing-bluetooth-security-assessment
Other
View skill →
performing-brand-monitoring-for-impersonation
DevOps
View skill →
performing-brand-monitoring-for-impersonation
DevOps
View skill →
performing-clickjacking-attack-test
Other
View skill →
performing-cloud-asset-inventory-with-cartography
Other
View skill →
performing-cloud-forensics-investigation
DevOps
View skill →
performing-cloud-forensics-with-aws-cloudtrail
Shell
View skill →
performing-cloud-incident-containment-procedures
DevOps
View skill →
performing-cloud-log-forensics-with-athena
SQL
View skill →
performing-cloud-native-forensics-with-falco
DevOps
View skill →
performing-cloud-native-threat-hunting-with-aws-detective
DevOps
View skill →
performing-cloud-penetration-testing-with-pacu
Code
View skill →
performing-cloud-storage-forensic-acquisition
API integration
View skill →
performing-container-escape-detection
DevOps
View skill →
performing-container-image-hardening
Other
View skill →
performing-container-security-scanning-with-trivy
Automation
View skill →
performing-content-security-policy-bypass
Other
View skill →
performing-credential-access-with-lazagne
Shell
View skill →
performing-cryptographic-audit-of-application
Other
View skill →
performing-csrf-attack-simulation
Other
View skill →
performing-cve-prioritization-with-kev-catalog
Shell
View skill →
performing-dark-web-monitoring-for-threats
DevOps
View skill →
performing-deception-technology-deployment
Shell
View skill →
performing-directory-traversal-testing
Document
View skill →
performing-disk-forensics-investigation
DevOps
View skill →
performing-dmarc-policy-enforcement-rollout
Data
View skill →
performing-dns-enumeration-and-zone-transfer
Data
View skill →
performing-dns-tunneling-detection
Other
View skill →
performing-docker-bench-security-assessment
Shell
View skill →
performing-dynamic-analysis-of-android-app
Other
View skill →
performing-dynamic-analysis-with-any-run
Shell
View skill →
performing-endpoint-forensics-investigation
Shell
View skill →
performing-endpoint-vulnerability-remediation
DevOps
View skill →
performing-entitlement-review-with-sailpoint-iiq
Marketing
View skill →
performing-external-network-penetration-test
Other
View skill →
performing-false-positive-reduction-in-siem
Shell
View skill →
performing-file-carving-with-foremost
Other
View skill →
performing-firmware-extraction-with-binwalk
Shell
View skill →
performing-firmware-malware-analysis
Other
View skill →
performing-fuzzing-with-aflplusplus
Marketing
View skill →
performing-gcp-penetration-testing-with-gcpbucketbrute
DevOps
View skill →
performing-gcp-security-assessment-with-forseti
DevOps
View skill →
performing-graphql-depth-limit-attack
Other
View skill →
performing-graphql-introspection-attack
Data
View skill →
performing-graphql-security-assessment
Other
View skill →
performing-hardware-security-module-integration
Code
View skill →
performing-hash-cracking-with-hashcat
Other
View skill →
performing-http-parameter-pollution-attack
Shell
View skill →
performing-ics-asset-discovery-with-claroty
DevOps
View skill →
performing-indicator-lifecycle-management
DevOps
View skill →
performing-initial-access-with-evilginx3
SQL
View skill →
performing-insider-threat-investigation
Shell
View skill →
performing-ioc-enrichment-automation
SQL
View skill →
performing-ios-app-security-assessment
Testing
View skill →
performing-iot-security-assessment
Other
View skill →
performing-ip-reputation-analysis-with-shodan
Other
View skill →
performing-jwt-none-algorithm-attack
Other
View skill →
performing-kerberoasting-attack
Other
View skill →
performing-kubernetes-cis-benchmark-with-kube-bench
DevOps
View skill →
performing-kubernetes-etcd-security-assessment
DevOps
View skill →
performing-kubernetes-penetration-testing
DevOps
View skill →
performing-lateral-movement-detection
Shell
View skill →
performing-lateral-movement-with-wmiexec
Shell
View skill →
performing-linux-log-forensics-investigation
Shell
View skill →
performing-log-analysis-for-forensic-investigation
Other
View skill →
performing-log-source-onboarding-in-siem
Other
View skill →
performing-malware-hash-enrichment-with-virustotal
Code
View skill →
performing-malware-ioc-extraction
SQL
View skill →
performing-malware-persistence-investigation
Other
View skill →
performing-malware-triage-with-yara
SQL
View skill →
performing-memory-forensics-with-volatility3
Other
View skill →
performing-memory-forensics-with-volatility3-plugins
SQL
View skill →
performing-mobile-app-certificate-pinning-bypass
SQL
View skill →
performing-mobile-device-forensics-with-cellebrite
Other
View skill →
performing-network-forensics-with-wireshark
Other
View skill →
performing-network-packet-capture-analysis
Other
View skill →
performing-network-traffic-analysis-with-tshark
Other
View skill →
performing-network-traffic-analysis-with-zeek
Other
View skill →
performing-nist-csf-maturity-assessment
Shell
View skill →
performing-oauth-scope-minimization-review
Web
View skill →
performing-oil-gas-cybersecurity-assessment
Other
View skill →
performing-open-source-intelligence-gathering
Document
View skill →
performing-open-source-intelligence-gathering
Document
View skill →
performing-osint-with-spiderfoot
Web
View skill →
performing-ot-network-security-assessment
DevOps
View skill →
performing-ot-vulnerability-assessment-with-claroty
Shell
View skill →
performing-ot-vulnerability-scanning-safely
DevOps
View skill →
performing-packet-injection-attack
DevOps
View skill →
performing-paste-site-monitoring-for-credentials
DevOps
View skill →
performing-paste-site-monitoring-for-credentials
DevOps
View skill →
performing-phishing-simulation-with-gophish
Marketing
View skill →
performing-physical-intrusion-assessment
Other
View skill →
performing-plc-firmware-security-analysis
Other
View skill →
performing-post-quantum-cryptography-migration
Web
View skill →
performing-power-grid-cybersecurity-assessment
Other
View skill →
performing-privacy-impact-assessment
Writing
View skill →
performing-privilege-escalation-assessment
Code
View skill →
performing-privilege-escalation-on-linux
Code
View skill →
performing-privileged-account-access-review
Research
View skill →
performing-privileged-account-discovery
Other
View skill →
performing-purple-team-atomic-testing
Shell
View skill →
performing-purple-team-exercise
Other
View skill →
performing-ransomware-response
DevOps
View skill →
performing-ransomware-tabletop-exercise
DevOps
View skill →
performing-red-team-phishing-with-gophish
Marketing
View skill →
performing-red-team-with-covenant
Other
View skill →
performing-s7comm-protocol-security-analysis
Shell
View skill →
performing-sca-dependency-scanning-with-snyk
Automation
View skill →
performing-scada-hmi-security-assessment
Shell
View skill →
performing-second-order-sql-injection
SQL
View skill →
performing-security-headers-audit
Other
View skill →
performing-serverless-function-security-review
DevOps
View skill →
performing-service-account-audit
Other
View skill →
performing-service-account-credential-rotation
Other
View skill →
performing-soap-web-service-security-testing
SQL
View skill →
performing-soc-tabletop-exercise
DevOps
View skill →
performing-soc2-type2-audit-preparation
Code
View skill →
performing-sqlite-database-forensics
SQL
View skill →
performing-ssl-certificate-lifecycle-management
DevOps
View skill →
performing-ssl-stripping-attack
Data
View skill →
performing-ssl-tls-inspection-configuration
Other
View skill →
performing-ssl-tls-security-assessment
Testing
View skill →
performing-ssrf-vulnerability-exploitation
DevOps
View skill →
performing-static-malware-analysis-with-pe-studio
SQL
View skill →
performing-steganography-detection
Other
View skill →
performing-subdomain-enumeration-with-subfinder
macOS
View skill →
performing-supply-chain-attack-simulation
Testing
View skill →
performing-thick-client-application-penetration-test
Other
View skill →
performing-threat-emulation-with-atomic-red-team
Data
View skill →
performing-threat-hunting-with-elastic-siem
Other
View skill →
performing-threat-hunting-with-yara-rules
Code
View skill →
performing-threat-intelligence-sharing-with-misp
Other
View skill →
performing-threat-landscape-assessment-for-sector
Other
View skill →
performing-threat-modeling-with-owasp-threat-dragon
Other
View skill →
performing-timeline-reconstruction-with-plaso
Other
View skill →
performing-user-behavior-analytics
Shell
View skill →
performing-vlan-hopping-attack
Other
View skill →
performing-vulnerability-scanning-with-nessus
DevOps
View skill →
performing-web-application-firewall-bypass
DevOps
View skill →
performing-web-application-penetration-test
SQL
View skill →
performing-web-application-scanning-with-nikto
Other
View skill →
performing-web-application-vulnerability-triage
Other
View skill →
performing-web-cache-deception-attack
Other
View skill →
performing-web-cache-poisoning-attack
Other
View skill →
performing-wifi-password-cracking-with-aircrack
Other
View skill →
performing-windows-artifact-analysis-with-eric-zimmerman-tools
Other
View skill →
performing-wireless-network-penetration-test
Other
View skill →
performing-wireless-security-assessment-with-kismet
DevOps
View skill →
performing-yara-rule-development-for-detection
Other
View skill →
prioritizing-vulnerabilities-with-cvss-scoring
Document
View skill →
processing-stix-taxii-feeds
Other
View skill →
profiling-threat-actor-groups
Marketing
View skill →
recovering-deleted-files-with-photorec
Shell
View skill →
recovering-from-ransomware-attack
DevOps
View skill →
remediating-s3-bucket-misconfiguration
DevOps
View skill →
reverse-engineering-android-malware-with-jadx
Code
View skill →
reverse-engineering-dotnet-malware-with-dnspy
Document
View skill →
reverse-engineering-ios-app-with-frida
Document
View skill →
reverse-engineering-malware-with-ghidra
Document
View skill →
reverse-engineering-ransomware-encryption-routine
Other
View skill →
reverse-engineering-rust-malware
Code
View skill →
scanning-container-images-with-grype
Shell
View skill →
scanning-containers-with-trivy-in-cicd
Automation
View skill →
scanning-docker-images-with-trivy
DevOps
View skill →
scanning-infrastructure-with-nessus
DevOps
View skill →
scanning-kubernetes-manifests-with-kubesec
DevOps
View skill →
scanning-network-with-nmap-advanced
Other
View skill →
securing-api-gateway-with-aws-waf
DevOps
View skill →
securing-aws-iam-permissions
Data
View skill →
securing-aws-lambda-execution-roles
Data
View skill →
securing-azure-with-microsoft-defender
Other
View skill →
securing-container-registry-images
Document
View skill →
securing-container-registry-with-harbor
DevOps
View skill →
securing-github-actions-workflows
Code
View skill →
securing-helm-chart-deployments
DevOps
View skill →
securing-historian-server-in-ot-environment
Shell
View skill →
securing-kubernetes-on-cloud
DevOps
View skill →
securing-remote-access-to-ot-environment
Other
View skill →
securing-serverless-functions
DevOps
View skill →
testing-android-intents-for-vulnerabilities
Shell
View skill →
testing-api-authentication-weaknesses
SQL
View skill →
testing-api-for-broken-object-level-authorization
Data
View skill →
testing-api-for-mass-assignment-vulnerability
Other
View skill →
testing-api-security-with-owasp-top-10
Other
View skill →
testing-cors-misconfiguration
Other
View skill →
testing-for-broken-access-control
Code
View skill →
testing-for-business-logic-vulnerabilities
DevOps
View skill →
testing-for-email-header-injection
Communication
View skill →
testing-for-host-header-injection
Other
View skill →
testing-for-json-web-token-vulnerabilities
Code
View skill →
testing-for-open-redirect-vulnerabilities
Testing
View skill →
testing-for-sensitive-data-exposure
SQL
View skill →
testing-for-xml-injection-vulnerabilities
Document
View skill →
testing-for-xss-vulnerabilities
SQL
View skill →
testing-for-xss-vulnerabilities-with-burpsuite
Other
View skill →
testing-for-xxe-injection-vulnerabilities
Document
View skill →
testing-jwt-token-security
Other
View skill →
testing-mobile-api-authentication
Code
View skill →
testing-oauth2-implementation-flaws
Code
View skill →
testing-ransomware-recovery-procedures
Other
View skill →
testing-websocket-api-security
Code
View skill →
tracking-threat-actor-infrastructure
DevOps
View skill →
triaging-security-alerts-in-splunk
Code
View skill →
triaging-security-incident
Shell
View skill →
triaging-security-incident-with-ir-playbook
Other
View skill →
triaging-vulnerabilities-with-ssvc-framework
Other
View skill →
validating-backup-integrity-for-recovery
DevOps
View skill →