Back to categories
Category

Agent Skills in category: Uncategorized

72246 skills match this category. Browse curated collections and explore related Agent Skills.

performing-api-fuzzing-with-restler

>

plurigrid
plurigrid
165

performing-api-inventory-and-discovery

>

plurigrid
plurigrid
165

performing-api-rate-limiting-bypass

>

plurigrid
plurigrid
165

performing-api-security-testing-with-postman

>

plurigrid
plurigrid
165

performing-arp-spoofing-attack-simulation

>

plurigrid
plurigrid
165

performing-asset-criticality-scoring-for-vulns

Develop and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization based on business impact, data sensitivity, and operational importance.

plurigrid
plurigrid
165

performing-authenticated-scan-with-openvas

Configure and execute authenticated vulnerability scans using OpenVAS/Greenbone Vulnerability Management with SSH and SMB credentials for comprehensive host-level assessment.

plurigrid
plurigrid
165

performing-authenticated-vulnerability-scan

Authenticated (credentialed) vulnerability scanning uses valid system credentials to log into target hosts and perform deep inspection of installed software, patches, configurations, and security sett

plurigrid
plurigrid
165

performing-automated-malware-analysis-with-cape

Deploy and operate CAPEv2 sandbox for automated malware analysis with behavioral monitoring, payload extraction, configuration parsing, and anti-evasion capabilities.

plurigrid
plurigrid
165

performing-aws-account-enumeration-with-scout-suite

Perform comprehensive security posture assessment of AWS accounts using ScoutSuite to enumerate resources, identify misconfigurations, and generate actionable security reports.

plurigrid
plurigrid
165

performing-aws-privilege-escalation-assessment

>

plurigrid
plurigrid
165

performing-bandwidth-throttling-attack-simulation

>

plurigrid
plurigrid
165

performing-binary-exploitation-analysis

>

plurigrid
plurigrid
165

performing-blind-ssrf-exploitation

Detect and exploit blind Server-Side Request Forgery vulnerabilities using out-of-band techniques, DNS interactions, and timing analysis to access internal services and cloud metadata endpoints.

plurigrid
plurigrid
165

performing-bluetooth-security-assessment

Assess Bluetooth Low Energy device security by scanning, enumerating GATT services, and detecting vulnerabilities

plurigrid
plurigrid
165

performing-brand-monitoring-for-impersonation

Monitor for brand impersonation attacks across domains, social media, mobile apps, and dark web channels to detect phishing campaigns, fake sites, and unauthorized brand usage targeting your organization.

plurigrid
plurigrid
165

performing-clickjacking-attack-test

Testing web applications for clickjacking vulnerabilities by assessing frame embedding controls and crafting proof-of-concept overlay attacks during authorized security assessments.

plurigrid
plurigrid
165

performing-cloud-asset-inventory-with-cartography

Perform comprehensive cloud asset inventory and relationship mapping using Cartography to build a Neo4j security graph of infrastructure assets, IAM permissions, and attack paths across AWS, GCP, and Azure.

plurigrid
plurigrid
165

performing-cloud-forensics-investigation

Conduct forensic investigations in cloud environments by collecting and analyzing logs, snapshots, and metadata from AWS, Azure, and GCP services.

plurigrid
plurigrid
165

performing-cloud-forensics-with-aws-cloudtrail

Perform forensic investigation of AWS environments using CloudTrail logs to reconstruct attacker activity, identify compromised credentials, and analyze API call patterns.

plurigrid
plurigrid
165

performing-cloud-incident-containment-procedures

Execute cloud-native incident containment across AWS, Azure, and GCP by isolating compromised resources, revoking credentials, preserving forensic evidence, and applying security group restrictions to prevent lateral movement.

plurigrid
plurigrid
165

performing-cloud-log-forensics-with-athena

>

plurigrid
plurigrid
165

performing-cloud-native-forensics-with-falco

>

plurigrid
plurigrid
165

performing-cloud-penetration-testing-with-pacu

>

plurigrid
plurigrid
165

performing-cloud-storage-forensic-acquisition

Perform forensic acquisition and analysis of cloud storage services including Google Drive, OneDrive, Dropbox, and Box by collecting both API-based remote data and local sync client artifacts from endpoint devices.

plurigrid
plurigrid
165

performing-container-escape-detection

>

plurigrid
plurigrid
165

performing-container-image-hardening

>

plurigrid
plurigrid
165

performing-container-security-scanning-with-trivy

Scan container images, filesystems, and Kubernetes manifests for vulnerabilities, misconfigurations, exposed secrets, and license compliance issues using Aqua Security Trivy with SBOM generation and CI/CD integration.

plurigrid
plurigrid
165

performing-content-security-policy-bypass

Analyze and bypass Content Security Policy implementations to achieve cross-site scripting by exploiting misconfigurations, JSONP endpoints, unsafe directives, and policy injection techniques.

plurigrid
plurigrid
165

performing-credential-access-with-lazagne

Extract stored credentials from compromised endpoints using the LaZagne post-exploitation tool to recover passwords from browsers, databases, system vaults, and applications during authorized red team operations.

plurigrid
plurigrid
165

performing-cryptographic-audit-of-application

A cryptographic audit systematically reviews an application's use of cryptographic primitives, protocols, and key management to identify vulnerabilities such as weak algorithms, insecure modes, hardco

plurigrid
plurigrid
165

performing-csrf-attack-simulation

Testing web applications for Cross-Site Request Forgery vulnerabilities by crafting forged requests that exploit authenticated user sessions during authorized security assessments.

plurigrid
plurigrid
165

performing-cve-prioritization-with-kev-catalog

Leverage the CISA Known Exploited Vulnerabilities catalog alongside EPSS and CVSS to prioritize CVE remediation based on real-world exploitation evidence.

plurigrid
plurigrid
165

propagators

Sussman/Radul propagator networks for constraint propagation and bidirectional

plurigrid
plurigrid
165

performing-dark-web-monitoring-for-threats

Dark web monitoring involves systematically scanning Tor hidden services, underground forums, paste sites, and dark web marketplaces to identify threats targeting an organization, including leaked cre

plurigrid
plurigrid
165

performing-deception-technology-deployment

>

plurigrid
plurigrid
165

performing-directory-traversal-testing

Testing web applications for path traversal vulnerabilities that allow reading or writing arbitrary files on the server by manipulating file path parameters.

plurigrid
plurigrid
165

performing-disk-forensics-investigation

>

plurigrid
plurigrid
165

performing-dmarc-policy-enforcement-rollout

Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring all legitimate email sources are authenticated before blocking unauthorized senders.

plurigrid
plurigrid
165

performing-dns-enumeration-and-zone-transfer

>

plurigrid
plurigrid
165

performing-dns-tunneling-detection

>

plurigrid
plurigrid
165

performing-docker-bench-security-assessment

Docker Bench for Security is an open-source script that checks dozens of common best practices around deploying Docker containers in production. Based on the CIS Docker Benchmark, it audits host confi

plurigrid
plurigrid
165

performing-dynamic-analysis-of-android-app

>

plurigrid
plurigrid
165

performing-dynamic-analysis-with-any-run

>

plurigrid
plurigrid
165

performing-endpoint-forensics-investigation

>

plurigrid
plurigrid
165

performing-endpoint-vulnerability-remediation

>

plurigrid
plurigrid
165

performing-entitlement-review-with-sailpoint-iiq

>

plurigrid
plurigrid
165

performing-external-network-penetration-test

Conduct a comprehensive external network penetration test to identify vulnerabilities in internet-facing infrastructure using PTES methodology, reconnaissance, scanning, exploitation, and reporting.

plurigrid
plurigrid
165

performing-false-positive-reduction-in-siem

Perform systematic SIEM false positive reduction through rule tuning, threshold adjustment, correlation refinement, and threat intelligence enrichment to combat alert fatigue.

plurigrid
plurigrid
165

performing-file-carving-with-foremost

Recover files from disk images and unallocated space using Foremost's header-footer signature carving to extract evidence regardless of file system state.

plurigrid
plurigrid
165

Page 297 of 1445 · 72246 results