Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

performing-api-security-testing-with-postman

>

UncategorizedView skill →

performing-arp-spoofing-attack-simulation

>

UncategorizedView skill →

performing-asset-criticality-scoring-for-vulns

Develop and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization based on business impact, data sensitivity, and operational importance.

UncategorizedView skill →

performing-authenticated-scan-with-openvas

Configure and execute authenticated vulnerability scans using OpenVAS/Greenbone Vulnerability Management with SSH and SMB credentials for comprehensive host-level assessment.

UncategorizedView skill →

performing-authenticated-vulnerability-scan

Authenticated (credentialed) vulnerability scanning uses valid system credentials to log into target hosts and perform deep inspection of installed software, patches, configurations, and security sett

UncategorizedView skill →

performing-automated-malware-analysis-with-cape

Deploy and operate CAPEv2 sandbox for automated malware analysis with behavioral monitoring, payload extraction, configuration parsing, and anti-evasion capabilities.

UncategorizedView skill →

performing-aws-account-enumeration-with-scout-suite

Perform comprehensive security posture assessment of AWS accounts using ScoutSuite to enumerate resources, identify misconfigurations, and generate actionable security reports.

UncategorizedView skill →

performing-aws-privilege-escalation-assessment

>

UncategorizedView skill →

performing-bandwidth-throttling-attack-simulation

>

UncategorizedView skill →

performing-binary-exploitation-analysis

>

UncategorizedView skill →

performing-blind-ssrf-exploitation

Detect and exploit blind Server-Side Request Forgery vulnerabilities using out-of-band techniques, DNS interactions, and timing analysis to access internal services and cloud metadata endpoints.

UncategorizedView skill →

performing-bluetooth-security-assessment

Assess Bluetooth Low Energy device security by scanning, enumerating GATT services, and detecting vulnerabilities

UncategorizedView skill →

performing-brand-monitoring-for-impersonation

Monitor for brand impersonation attacks across domains, social media, mobile apps, and dark web channels to detect phishing campaigns, fake sites, and unauthorized brand usage targeting your organization.

UncategorizedView skill →

performing-clickjacking-attack-test

Testing web applications for clickjacking vulnerabilities by assessing frame embedding controls and crafting proof-of-concept overlay attacks during authorized security assessments.

UncategorizedView skill →

performing-cloud-asset-inventory-with-cartography

Perform comprehensive cloud asset inventory and relationship mapping using Cartography to build a Neo4j security graph of infrastructure assets, IAM permissions, and attack paths across AWS, GCP, and Azure.

UncategorizedView skill →

performing-cloud-forensics-investigation

Conduct forensic investigations in cloud environments by collecting and analyzing logs, snapshots, and metadata from AWS, Azure, and GCP services.

UncategorizedView skill →

performing-cloud-forensics-with-aws-cloudtrail

Perform forensic investigation of AWS environments using CloudTrail logs to reconstruct attacker activity, identify compromised credentials, and analyze API call patterns.

UncategorizedView skill →

performing-cloud-incident-containment-procedures

Execute cloud-native incident containment across AWS, Azure, and GCP by isolating compromised resources, revoking credentials, preserving forensic evidence, and applying security group restrictions to prevent lateral movement.

UncategorizedView skill →

performing-cloud-log-forensics-with-athena

>

UncategorizedView skill →

performing-cloud-native-forensics-with-falco

>

UncategorizedView skill →

performing-cloud-penetration-testing-with-pacu

>

UncategorizedView skill →

performing-cloud-storage-forensic-acquisition

Perform forensic acquisition and analysis of cloud storage services including Google Drive, OneDrive, Dropbox, and Box by collecting both API-based remote data and local sync client artifacts from endpoint devices.

UncategorizedView skill →

performing-container-escape-detection

>

UncategorizedView skill →

performing-container-image-hardening

>

UncategorizedView skill →

performing-container-security-scanning-with-trivy

Scan container images, filesystems, and Kubernetes manifests for vulnerabilities, misconfigurations, exposed secrets, and license compliance issues using Aqua Security Trivy with SBOM generation and CI/CD integration.

UncategorizedView skill →

performing-content-security-policy-bypass

Analyze and bypass Content Security Policy implementations to achieve cross-site scripting by exploiting misconfigurations, JSONP endpoints, unsafe directives, and policy injection techniques.

UncategorizedView skill →

performing-credential-access-with-lazagne

Extract stored credentials from compromised endpoints using the LaZagne post-exploitation tool to recover passwords from browsers, databases, system vaults, and applications during authorized red team operations.

UncategorizedView skill →

performing-cryptographic-audit-of-application

A cryptographic audit systematically reviews an application's use of cryptographic primitives, protocols, and key management to identify vulnerabilities such as weak algorithms, insecure modes, hardco

UncategorizedView skill →

performing-csrf-attack-simulation

Testing web applications for Cross-Site Request Forgery vulnerabilities by crafting forged requests that exploit authenticated user sessions during authorized security assessments.

UncategorizedView skill →

performing-cve-prioritization-with-kev-catalog

Leverage the CISA Known Exploited Vulnerabilities catalog alongside EPSS and CVSS to prioritize CVE remediation based on real-world exploitation evidence.

UncategorizedView skill →

propagators

Sussman/Radul propagator networks for constraint propagation and bidirectional

UncategorizedView skill →

performing-dark-web-monitoring-for-threats

Dark web monitoring involves systematically scanning Tor hidden services, underground forums, paste sites, and dark web marketplaces to identify threats targeting an organization, including leaked cre

UncategorizedView skill →

performing-deception-technology-deployment

>

UncategorizedView skill →

performing-directory-traversal-testing

Testing web applications for path traversal vulnerabilities that allow reading or writing arbitrary files on the server by manipulating file path parameters.

UncategorizedView skill →

performing-disk-forensics-investigation

>

UncategorizedView skill →

performing-dmarc-policy-enforcement-rollout

Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring all legitimate email sources are authenticated before blocking unauthorized senders.

UncategorizedView skill →

performing-dns-enumeration-and-zone-transfer

>

UncategorizedView skill →

performing-dns-tunneling-detection

>

UncategorizedView skill →

performing-docker-bench-security-assessment

Docker Bench for Security is an open-source script that checks dozens of common best practices around deploying Docker containers in production. Based on the CIS Docker Benchmark, it audits host confi

UncategorizedView skill →

performing-dynamic-analysis-of-android-app

>

UncategorizedView skill →

performing-dynamic-analysis-with-any-run

>

UncategorizedView skill →

performing-endpoint-forensics-investigation

>

UncategorizedView skill →

performing-endpoint-vulnerability-remediation

>

UncategorizedView skill →

performing-entitlement-review-with-sailpoint-iiq

>

UncategorizedView skill →

performing-external-network-penetration-test

Conduct a comprehensive external network penetration test to identify vulnerabilities in internet-facing infrastructure using PTES methodology, reconnaissance, scanning, exploitation, and reporting.

UncategorizedView skill →

performing-false-positive-reduction-in-siem

Perform systematic SIEM false positive reduction through rule tuning, threshold adjustment, correlation refinement, and threat intelligence enrichment to combat alert fatigue.

UncategorizedView skill →

performing-file-carving-with-foremost

Recover files from disk images and unallocated space using Foremost's header-footer signature carving to extract evidence regardless of file system state.

UncategorizedView skill →

performing-firmware-extraction-with-binwalk

>

UncategorizedView skill →

performing-firmware-malware-analysis

>

UncategorizedView skill →

performing-fuzzing-with-aflplusplus

>

UncategorizedView skill →

Page 21 of 41 · 2048 results