Back to categories
Category

Agent Skills in category: Uncategorized

72246 skills match this category. Browse curated collections and explore related Agent Skills.

performing-firmware-extraction-with-binwalk

>

plurigrid
plurigrid
165

performing-firmware-malware-analysis

>

plurigrid
plurigrid
165

performing-fuzzing-with-aflplusplus

>

plurigrid
plurigrid
165

performing-gcp-penetration-testing-with-gcpbucketbrute

Perform GCP security testing using GCPBucketBrute for storage bucket enumeration, gcloud IAM privilege escalation path analysis, and service account permission auditing

plurigrid
plurigrid
165

performing-gcp-security-assessment-with-forseti

>

plurigrid
plurigrid
165

performing-graphql-depth-limit-attack

Execute and test GraphQL depth limit attacks using deeply nested recursive queries to identify denial-of-service vulnerabilities in GraphQL APIs.

plurigrid
plurigrid
165

performing-graphql-security-assessment

Assessing GraphQL API endpoints for introspection leaks, injection attacks, authorization flaws, and denial-of-service vulnerabilities during authorized security tests.

plurigrid
plurigrid
165

performing-hardware-security-module-integration

Integrate Hardware Security Modules (HSMs) using PKCS#11 interface for cryptographic key management, signing operations, and secure key storage with python-pkcs11, AWS CloudHSM, and YubiHSM2.

plurigrid
plurigrid
165

performing-hash-cracking-with-hashcat

Hash cracking is an essential skill for penetration testers and security auditors to evaluate password strength. Hashcat is the world's fastest password recovery tool, supporting over 300 hash types w

plurigrid
plurigrid
165

performing-http-parameter-pollution-attack

Execute HTTP Parameter Pollution attacks to bypass input validation, WAF rules, and security controls by injecting duplicate parameters that are processed differently by front-end and back-end systems.

plurigrid
plurigrid
165

performing-ics-asset-discovery-with-claroty

>

plurigrid
plurigrid
165

performing-indicator-lifecycle-management

Indicator lifecycle management tracks IOCs from initial discovery through validation, enrichment, deployment, monitoring, and eventual retirement. This skill covers implementing systematic processes f

plurigrid
plurigrid
165

performing-initial-access-with-evilginx3

Perform authorized initial access using EvilGinx3 adversary-in-the-middle phishing framework to capture session tokens and bypass multi-factor authentication during red team engagements.

plurigrid
plurigrid
165

performing-insider-threat-investigation

>

plurigrid
plurigrid
165

performing-ioc-enrichment-automation

>

plurigrid
plurigrid
165

performing-ios-app-security-assessment

>

plurigrid
plurigrid
165

performing-iot-security-assessment

>

plurigrid
plurigrid
165

performing-ip-reputation-analysis-with-shodan

Analyze IP address reputation using the Shodan API to identify open ports, running services, known vulnerabilities, and hosting context for threat intelligence enrichment and incident triage.

plurigrid
plurigrid
165

performing-jwt-none-algorithm-attack

Execute and test the JWT none algorithm attack to bypass signature verification by manipulating the alg header field in JSON Web Tokens.

plurigrid
plurigrid
165

performing-kerberoasting-attack

Kerberoasting is a post-exploitation technique that targets service accounts in Active Directory by requesting Kerberos TGS (Ticket Granting Service) tickets for accounts with Service Principal Names

plurigrid
plurigrid
165

performing-kubernetes-cis-benchmark-with-kube-bench

Audit Kubernetes cluster security posture against CIS benchmarks using kube-bench with automated checks for control plane, worker nodes, and RBAC.

plurigrid
plurigrid
165

performing-kubernetes-etcd-security-assessment

Assess the security posture of Kubernetes etcd clusters by evaluating encryption at rest, TLS configuration, access controls, backup encryption, and network isolation.

plurigrid
plurigrid
165

performing-kubernetes-penetration-testing

Kubernetes penetration testing systematically evaluates cluster security by simulating attacker techniques against the API server, kubelet, etcd, pods, RBAC, network policies, and secrets. Using tools

plurigrid
plurigrid
165

performing-lateral-movement-detection

>

plurigrid
plurigrid
165

performing-lateral-movement-with-wmiexec

Perform lateral movement across Windows networks using WMI-based remote execution techniques including Impacket wmiexec.py, CrackMapExec, and native WMI commands for stealthy post-exploitation during red team engagements.

plurigrid
plurigrid
165

performing-linux-log-forensics-investigation

Perform forensic investigation of Linux system logs including syslog, auth.log, systemd journal, kern.log, and application logs to reconstruct user activity, detect unauthorized access, and establish event timelines on compromised Linux systems.

plurigrid
plurigrid
165

performing-log-analysis-for-forensic-investigation

Collect, parse, and correlate system, application, and security logs to reconstruct events and establish timelines during forensic investigations.

plurigrid
plurigrid
165

performing-log-source-onboarding-in-siem

Perform structured log source onboarding into SIEM platforms by configuring collectors, parsers, normalization, and validation for complete security visibility.

plurigrid
plurigrid
165

performing-malware-hash-enrichment-with-virustotal

Enrich malware file hashes using the VirusTotal API to retrieve detection rates, behavioral analysis, YARA matches, and contextual threat intelligence for incident triage and IOC validation.

plurigrid
plurigrid
165

performing-malware-ioc-extraction

Malware IOC extraction is the process of analyzing malicious software to identify actionable indicators of compromise including file hashes, network indicators (C2 domains, IP addresses, URLs), regist

plurigrid
plurigrid
165

performing-malware-persistence-investigation

Systematically investigate all persistence mechanisms on Windows and Linux systems to identify how malware survives reboots and maintains access.

plurigrid
plurigrid
165

performing-malware-triage-with-yara

>

plurigrid
plurigrid
165

performing-memory-forensics-with-volatility3-plugins

Analyze memory dumps using Volatility3 plugins to detect injected code, rootkits, credential theft, and malware artifacts in Windows, Linux, and macOS memory images.

plurigrid
plurigrid
165

performing-memory-forensics-with-volatility3

Analyze volatile memory dumps using Volatility 3 to extract running processes, network connections, loaded modules, and evidence of malicious activity.

plurigrid
plurigrid
165

performing-mobile-app-certificate-pinning-bypass

>

plurigrid
plurigrid
165

performing-mobile-device-forensics-with-cellebrite

Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications, location data, and application artifacts.

plurigrid
plurigrid
165

performing-network-forensics-with-wireshark

Capture and analyze network traffic using Wireshark and tshark to reconstruct network events, extract artifacts, and identify malicious communications.

plurigrid
plurigrid
165

performing-network-packet-capture-analysis

Perform forensic analysis of network packet captures (PCAP/PCAPNG) using Wireshark, tshark, and tcpdump to reconstruct network communications, extract transferred files, identify malicious traffic, and establish evidence of data exfiltration or command-and-control activity.

plurigrid
plurigrid
165

performing-network-traffic-analysis-with-tshark

Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection, DNS anomaly identification, and IOC extraction from PCAP files

plurigrid
plurigrid
165

performing-network-traffic-analysis-with-zeek

Deploy Zeek network security monitor to capture, parse, and analyze network traffic metadata for threat detection, anomaly identification, and forensic investigation.

plurigrid
plurigrid
165

performing-nist-csf-maturity-assessment

>-

plurigrid
plurigrid
165

performing-oauth-scope-minimization-review

>

plurigrid
plurigrid
165

performing-oil-gas-cybersecurity-assessment

>

plurigrid
plurigrid
165

privilege-declaration-generator

Generates tizen-manifest.xml and config.xml privilege declarations. Auto-detects required privileges from app source code.

plurigrid
plurigrid
165

performing-open-source-intelligence-gathering

Open Source Intelligence (OSINT) gathering is the first active phase of a red team engagement, where operators collect publicly available information about the target organization to identify attack s

plurigrid
plurigrid
165

performing-osint-with-spiderfoot

Automate OSINT collection using SpiderFoot REST API and CLI for target profiling, module-based reconnaissance, and structured result analysis across 200+ data sources

plurigrid
plurigrid
165

performing-ot-network-security-assessment

>

plurigrid
plurigrid
165

performing-ot-vulnerability-assessment-with-claroty

>

plurigrid
plurigrid
165

performing-ot-vulnerability-scanning-safely

>

plurigrid
plurigrid
165

performing-packet-injection-attack

>

plurigrid
plurigrid
165

Page 298 of 1445 · 72246 results