Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

performing-plc-firmware-security-analysis

>

UncategorizedView skill →

performing-post-quantum-cryptography-migration

>

UncategorizedView skill →

performing-power-grid-cybersecurity-assessment

>

UncategorizedView skill →

performing-privacy-impact-assessment

>

UncategorizedView skill →

performing-privilege-escalation-assessment

>

UncategorizedView skill →

performing-privilege-escalation-on-linux

Linux privilege escalation involves elevating from a low-privilege user account to root access on a compromised system. Red teams exploit misconfigurations, vulnerable services, kernel exploits, and w

UncategorizedView skill →

performing-privileged-account-access-review

Conduct systematic reviews of privileged accounts to validate access rights, identify excessive permissions, and enforce least privilege across PAM infrastructure.

UncategorizedView skill →

performing-privileged-account-discovery

Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local admins, service accounts, database admins, cloud IAM roles, and application admin account

UncategorizedView skill →

performing-purple-team-atomic-testing

>

UncategorizedView skill →

performing-purple-team-exercise

>

UncategorizedView skill →

performing-ransomware-response

>

UncategorizedView skill →

performing-ransomware-tabletop-exercise

>

UncategorizedView skill →

performing-red-team-phishing-with-gophish

>-

UncategorizedView skill →

processing-stix-taxii-feeds

>

UncategorizedView skill →

performing-red-team-with-covenant

Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener setup, grunt deployment, task execution, and lateral movement tracking.

UncategorizedView skill →

performing-s7comm-protocol-security-analysis

>

UncategorizedView skill →

performing-sca-dependency-scanning-with-snyk

>

UncategorizedView skill →

performing-scada-hmi-security-assessment

>

UncategorizedView skill →

performing-second-order-sql-injection

Detect and exploit second-order SQL injection vulnerabilities where malicious input is stored in a database and later executed in an unsafe SQL query during a different application operation.

UncategorizedView skill →

performing-security-headers-audit

Auditing HTTP security headers including CSP, HSTS, X-Frame-Options, and cookie attributes to identify missing or misconfigured browser-level protections.

UncategorizedView skill →

performing-serverless-function-security-review

>

UncategorizedView skill →

performing-service-account-audit

Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant accounts. This skill covers discovery of service accounts in Active Directory, cloud pl

UncategorizedView skill →

performing-service-account-credential-rotation

Automate credential rotation for service accounts across Active Directory, cloud platforms, and application databases to eliminate stale secrets and reduce compromise risk.

UncategorizedView skill →

performing-soap-web-service-security-testing

Perform security testing of SOAP web services by analyzing WSDL definitions and testing for XML injection, XXE, WS-Security bypass, and SOAPAction spoofing.

UncategorizedView skill →

performing-soc-tabletop-exercise

>

UncategorizedView skill →

performing-soc2-type2-audit-preparation

>

UncategorizedView skill →

performing-sqlite-database-forensics

Perform forensic analysis of SQLite databases to recover deleted records from freelists and WAL files, decode encoded timestamps, and extract evidence from browser history, messaging apps, and mobile device databases.

UncategorizedView skill →

performing-ssl-certificate-lifecycle-management

SSL/TLS certificate lifecycle management encompasses the full process of requesting, issuing, deploying, monitoring, renewing, and revoking X.509 certificates. Poor certificate management is a leading

UncategorizedView skill →

performing-ssl-stripping-attack

>

UncategorizedView skill →

performing-ssl-tls-inspection-configuration

Configure SSL/TLS inspection on network security devices to decrypt, inspect, and re-encrypt HTTPS traffic for threat detection while managing certificates, exemptions, and privacy compliance.

UncategorizedView skill →

performing-ssl-tls-security-assessment

Assess SSL/TLS server configurations using the sslyze Python library to evaluate cipher suites, certificate chains, protocol versions, HSTS headers, and known vulnerabilities like Heartbleed and ROBOT.

UncategorizedView skill →

performing-ssrf-vulnerability-exploitation

>-

UncategorizedView skill →

performing-static-malware-analysis-with-pe-studio

>

UncategorizedView skill →

performing-steganography-detection

Detect and extract hidden data embedded in images, audio, and other media files using steganalysis tools to uncover covert communication channels.

UncategorizedView skill →

profiling-threat-actor-groups

>

UncategorizedView skill →

performing-subdomain-enumeration-with-subfinder

Enumerate subdomains of target domains using ProjectDiscovery's Subfinder passive reconnaissance tool to map the attack surface during security assessments.

UncategorizedView skill →

performing-supply-chain-attack-simulation

Simulate and detect software supply chain attacks including typosquatting detection via Levenshtein distance, dependency confusion testing against private registries, package hash verification with pip, and known vulnerability scanning with pip-audit.

UncategorizedView skill →

performing-thick-client-application-penetration-test

Conduct a thick client application penetration test to identify insecure local storage, hardcoded credentials, DLL hijacking, memory manipulation, and insecure API communication in desktop applications using dnSpy, Procmon, and Burp Suite.

UncategorizedView skill →

performing-threat-emulation-with-atomic-red-team

>

UncategorizedView skill →

performing-threat-hunting-with-elastic-siem

>

UncategorizedView skill →

performing-threat-hunting-with-yara-rules

>

UncategorizedView skill →

performing-threat-intelligence-sharing-with-misp

Use PyMISP to create, enrich, and share threat intelligence events on a MISP platform, including IOC management, feed integration, STIX export, and community sharing workflows.

UncategorizedView skill →

performing-threat-landscape-assessment-for-sector

Conduct a sector-specific threat landscape assessment by analyzing threat actor targeting patterns, common attack vectors, and industry-specific vulnerabilities to inform organizational risk management.

UncategorizedView skill →

performing-threat-modeling-with-owasp-threat-dragon

Use OWASP Threat Dragon to create data flow diagrams, identify threats using STRIDE and LINDDUN methodologies, and generate threat model reports for secure design review.

UncategorizedView skill →

performing-timeline-reconstruction-with-plaso

Build comprehensive forensic super-timelines using Plaso (log2timeline) to correlate events across file systems, logs, and artifacts into a unified chronological view.

UncategorizedView skill →

performing-user-behavior-analytics

>

UncategorizedView skill →

performing-vlan-hopping-attack

>

UncategorizedView skill →

performing-vulnerability-scanning-with-nessus

>

UncategorizedView skill →

performing-web-application-firewall-bypass

Bypass Web Application Firewall protections using encoding techniques, HTTP method manipulation, parameter pollution, and payload obfuscation to deliver SQL injection, XSS, and other attack payloads past WAF detection rules.

UncategorizedView skill →

performing-web-application-penetration-test

>

UncategorizedView skill →

Page 23 of 41 · 2048 results