Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

collecting-volatile-evidence-from-compromised-host

Collect volatile forensic evidence from a compromised system following order of volatility, preserving memory, network connections, processes, and system state before they are lost.

UncategorizedView skill →

competitive-ads-extractor

Extracts and analyzes competitors' ads from ad libraries (Facebook, LinkedIn,

UncategorizedView skill →

condensed-anima-qc

Condensed ANIMA on quantum-classical and classical-quantum networks. All skill compositions materialized as s-expressions across the polyglot substrate.

UncategorizedView skill →

conducting-api-security-testing

>

UncategorizedView skill →

conducting-cloud-incident-response

>

UncategorizedView skill →

conducting-cloud-penetration-testing

>

UncategorizedView skill →

conducting-domain-persistence-with-dcsync

Perform DCSync attacks to replicate Active Directory credentials and establish domain persistence by extracting KRBTGT, Domain Admin, and service account hashes for Golden Ticket creation.

UncategorizedView skill →

conducting-external-reconnaissance-with-osint

>

UncategorizedView skill →

conducting-full-scope-red-team-engagement

Plan and execute a comprehensive red team engagement covering reconnaissance through post-exploitation using MITRE ATT&CK-aligned TTPs to evaluate an organization's detection and response capabilities.

UncategorizedView skill →

conducting-internal-network-penetration-test

Execute an internal network penetration test simulating an insider threat or post-breach attacker to identify lateral movement paths, privilege escalation vectors, and sensitive data exposure within the corporate network.

UncategorizedView skill →

conducting-internal-reconnaissance-with-bloodhound-ce

Conduct internal Active Directory reconnaissance using BloodHound Community Edition to map attack paths, identify privilege escalation chains, and discover misconfigurations in domain environments.

UncategorizedView skill →

conducting-malware-incident-response

>

UncategorizedView skill →

conducting-man-in-the-middle-attack-simulation

>

UncategorizedView skill →

conducting-memory-forensics-with-volatility

>

UncategorizedView skill →

conducting-mobile-app-penetration-test

>

UncategorizedView skill →

conducting-network-penetration-test

>

UncategorizedView skill →

conducting-pass-the-ticket-attack

Pass-the-Ticket (PtT) is a lateral movement technique that uses stolen Kerberos tickets (TGT or TGS) to authenticate to services without knowing the user's password. By extracting Kerberos tickets fro

UncategorizedView skill →

conducting-phishing-incident-response

>

UncategorizedView skill →

conducting-post-incident-lessons-learned

Facilitate structured post-incident reviews to identify root causes, document what worked and failed, and produce actionable recommendations to improve future incident response.

UncategorizedView skill →

conducting-social-engineering-penetration-test

Design and execute a social engineering penetration test including phishing, vishing, smishing, and physical pretexting campaigns to measure human security resilience and identify training gaps.

UncategorizedView skill →

conducting-social-engineering-pretext-call

Plan and execute authorized vishing (voice phishing) pretext calls to assess employee susceptibility to social engineering and evaluate security awareness controls.

UncategorizedView skill →

conducting-spearphishing-simulation-campaign

Spearphishing simulation is a targeted social engineering attack vector used by red teams to gain initial access. Unlike broad phishing campaigns, spearphishing uses OSINT-derived intelligence to craf

UncategorizedView skill →

conducting-wireless-network-penetration-test

>

UncategorizedView skill →

configuring-active-directory-tiered-model

Implement Microsoft's Enhanced Security Admin Environment (ESAE) tiered administration model for Active Directory. Covers Tier 0/1/2 separation, privileged access workstations (PAWs), administrative f

UncategorizedView skill →

configuring-aws-verified-access-for-ztna

Configure AWS Verified Access to provide VPN-less zero trust network access to internal applications using identity and device posture verification with Cedar policy language.

UncategorizedView skill →

configuring-certificate-authority-with-openssl

A Certificate Authority (CA) is the trust anchor in a PKI hierarchy, responsible for issuing, signing, and revoking digital certificates. This skill covers building a two-tier CA hierarchy (Root CA +

UncategorizedView skill →

configuring-host-based-intrusion-detection

>

UncategorizedView skill →

configuring-hsm-for-key-storage

Hardware Security Modules (HSMs) are tamper-resistant physical devices that safeguard cryptographic keys and perform cryptographic operations in a hardened environment. Keys stored in an HSM never lea

UncategorizedView skill →

configuring-identity-aware-proxy-with-google-iap

>

UncategorizedView skill →

configuring-ldap-security-hardening

Harden LDAP directory services against common attacks including credential harvesting, LDAP injection, anonymous binding, and channel binding bypass. Covers LDAPS enforcement, channel binding, LDAP si

UncategorizedView skill →

configuring-microsegmentation-for-zero-trust

Configure microsegmentation policies to enforce least-privilege workload-to-workload access using tools like VMware NSX, Illumio, and Calico, preventing lateral movement in zero trust architectures.

UncategorizedView skill →

configuring-multi-factor-authentication-with-duo

Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration methods, adaptive authentication policies, device trust

UncategorizedView skill →

configuring-network-segmentation-with-vlans

>

UncategorizedView skill →

configuring-oauth2-authorization-flow

Configure secure OAuth 2.0 authorization flows including Authorization Code with PKCE, Client Credentials, and Device Authorization Grant. This skill covers flow selection, PKCE implementation, token

UncategorizedView skill →

configuring-pfsense-firewall-rules

>

UncategorizedView skill →

configuring-snort-ids-for-intrusion-detection

>

UncategorizedView skill →

configuring-suricata-for-network-monitoring

>

UncategorizedView skill →

configuring-tls-1-3-for-secure-communications

TLS 1.3 (RFC 8446) is the latest version of the Transport Layer Security protocol, providing significant improvements over TLS 1.2 in both security and performance. It reduces handshake latency to 1-R

UncategorizedView skill →

configuring-windows-defender-advanced-settings

>

UncategorizedView skill →

configuring-windows-event-logging-for-detection

>

UncategorizedView skill →

configuring-zscaler-private-access-for-ztna

>

UncategorizedView skill →

consensus

Agreement protocol in multi-agent systems

UncategorizedView skill →

constant-time-analysis

Detects timing side-channel vulnerabilities in cryptographic code. Use when implementing or reviewing crypto code, encountering division on secrets, secret-dependent branches, or constant-time programming questions in C, C++, Go, Rust, Swift, Java, Kotlin, C#, PHP, JavaScript, TypeScript, Python, or Ruby.

UncategorizedView skill →

constant-time-testing

Testing for timing side channels and constant-time implementation verification.

UncategorizedView skill →

containing-active-breach

>

UncategorizedView skill →

content-research-writer

Assists in writing high-quality content by conducting research, adding

UncategorizedView skill →

correlating-security-events-in-qradar

>

UncategorizedView skill →

correlating-threat-campaigns

>

UncategorizedView skill →

cosmos-vulnerability-scanner

Scans Cosmos SDK blockchains for 9 consensus-critical vulnerabilities including non-determinism, incorrect signers, ABCI panics, and rounding errors. Use when auditing Cosmos chains or CosmWasm contracts. (project, gitignored)

UncategorizedView skill →

coupled-system

Interacting dynamical systems

UncategorizedView skill →

Page 8 of 41 · 2048 results