Back to categories
Category

Agent Skills in category: Uncategorized

72246 skills match this category. Browse curated collections and explore related Agent Skills.

performing-paste-site-monitoring-for-credentials

Monitor paste sites like Pastebin and GitHub Gists for leaked credentials, API keys, and sensitive data dumps using automated scraping and keyword matching to detect breaches early.

plurigrid
plurigrid
165

performing-phishing-simulation-with-gophish

GoPhish is an open-source phishing simulation framework used by security teams to conduct authorized phishing awareness campaigns. It provides campaign management, email template creation, landing pag

plurigrid
plurigrid
165

performing-physical-intrusion-assessment

Conduct authorized physical penetration testing using tailgating, badge cloning, lock bypassing, and rogue device deployment to evaluate facility security controls.

plurigrid
plurigrid
165

performing-plc-firmware-security-analysis

>

plurigrid
plurigrid
165

performing-post-quantum-cryptography-migration

>

plurigrid
plurigrid
165

performing-power-grid-cybersecurity-assessment

>

plurigrid
plurigrid
165

performing-privacy-impact-assessment

>

plurigrid
plurigrid
165

performing-privilege-escalation-assessment

>

plurigrid
plurigrid
165

performing-privilege-escalation-on-linux

Linux privilege escalation involves elevating from a low-privilege user account to root access on a compromised system. Red teams exploit misconfigurations, vulnerable services, kernel exploits, and w

plurigrid
plurigrid
165

performing-privileged-account-access-review

Conduct systematic reviews of privileged accounts to validate access rights, identify excessive permissions, and enforce least privilege across PAM infrastructure.

plurigrid
plurigrid
165

performing-privileged-account-discovery

Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local admins, service accounts, database admins, cloud IAM roles, and application admin account

plurigrid
plurigrid
165

performing-purple-team-atomic-testing

>

plurigrid
plurigrid
165

performing-purple-team-exercise

>

plurigrid
plurigrid
165

performing-ransomware-response

>

plurigrid
plurigrid
165

performing-ransomware-tabletop-exercise

>

plurigrid
plurigrid
165

performing-red-team-phishing-with-gophish

>-

plurigrid
plurigrid
165

processing-stix-taxii-feeds

>

plurigrid
plurigrid
165

performing-red-team-with-covenant

Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener setup, grunt deployment, task execution, and lateral movement tracking.

plurigrid
plurigrid
165

performing-s7comm-protocol-security-analysis

>

plurigrid
plurigrid
165

performing-sca-dependency-scanning-with-snyk

>

plurigrid
plurigrid
165

performing-scada-hmi-security-assessment

>

plurigrid
plurigrid
165

performing-second-order-sql-injection

Detect and exploit second-order SQL injection vulnerabilities where malicious input is stored in a database and later executed in an unsafe SQL query during a different application operation.

plurigrid
plurigrid
165

performing-security-headers-audit

Auditing HTTP security headers including CSP, HSTS, X-Frame-Options, and cookie attributes to identify missing or misconfigured browser-level protections.

plurigrid
plurigrid
165

performing-serverless-function-security-review

>

plurigrid
plurigrid
165

performing-service-account-audit

Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant accounts. This skill covers discovery of service accounts in Active Directory, cloud pl

plurigrid
plurigrid
165

performing-service-account-credential-rotation

Automate credential rotation for service accounts across Active Directory, cloud platforms, and application databases to eliminate stale secrets and reduce compromise risk.

plurigrid
plurigrid
165

performing-soap-web-service-security-testing

Perform security testing of SOAP web services by analyzing WSDL definitions and testing for XML injection, XXE, WS-Security bypass, and SOAPAction spoofing.

plurigrid
plurigrid
165

performing-soc-tabletop-exercise

>

plurigrid
plurigrid
165

performing-soc2-type2-audit-preparation

>

plurigrid
plurigrid
165

performing-sqlite-database-forensics

Perform forensic analysis of SQLite databases to recover deleted records from freelists and WAL files, decode encoded timestamps, and extract evidence from browser history, messaging apps, and mobile device databases.

plurigrid
plurigrid
165

performing-ssl-certificate-lifecycle-management

SSL/TLS certificate lifecycle management encompasses the full process of requesting, issuing, deploying, monitoring, renewing, and revoking X.509 certificates. Poor certificate management is a leading

plurigrid
plurigrid
165

performing-ssl-stripping-attack

>

plurigrid
plurigrid
165

performing-ssl-tls-inspection-configuration

Configure SSL/TLS inspection on network security devices to decrypt, inspect, and re-encrypt HTTPS traffic for threat detection while managing certificates, exemptions, and privacy compliance.

plurigrid
plurigrid
165

performing-ssl-tls-security-assessment

Assess SSL/TLS server configurations using the sslyze Python library to evaluate cipher suites, certificate chains, protocol versions, HSTS headers, and known vulnerabilities like Heartbleed and ROBOT.

plurigrid
plurigrid
165

performing-ssrf-vulnerability-exploitation

>-

plurigrid
plurigrid
165

performing-static-malware-analysis-with-pe-studio

>

plurigrid
plurigrid
165

performing-steganography-detection

Detect and extract hidden data embedded in images, audio, and other media files using steganalysis tools to uncover covert communication channels.

plurigrid
plurigrid
165

profiling-threat-actor-groups

>

plurigrid
plurigrid
165

performing-subdomain-enumeration-with-subfinder

Enumerate subdomains of target domains using ProjectDiscovery's Subfinder passive reconnaissance tool to map the attack surface during security assessments.

plurigrid
plurigrid
165

performing-supply-chain-attack-simulation

Simulate and detect software supply chain attacks including typosquatting detection via Levenshtein distance, dependency confusion testing against private registries, package hash verification with pip, and known vulnerability scanning with pip-audit.

plurigrid
plurigrid
165

performing-thick-client-application-penetration-test

Conduct a thick client application penetration test to identify insecure local storage, hardcoded credentials, DLL hijacking, memory manipulation, and insecure API communication in desktop applications using dnSpy, Procmon, and Burp Suite.

plurigrid
plurigrid
165

performing-threat-emulation-with-atomic-red-team

>

plurigrid
plurigrid
165

performing-threat-hunting-with-elastic-siem

>

plurigrid
plurigrid
165

performing-threat-hunting-with-yara-rules

>

plurigrid
plurigrid
165

performing-threat-intelligence-sharing-with-misp

Use PyMISP to create, enrich, and share threat intelligence events on a MISP platform, including IOC management, feed integration, STIX export, and community sharing workflows.

plurigrid
plurigrid
165

performing-threat-landscape-assessment-for-sector

Conduct a sector-specific threat landscape assessment by analyzing threat actor targeting patterns, common attack vectors, and industry-specific vulnerabilities to inform organizational risk management.

plurigrid
plurigrid
165

performing-threat-modeling-with-owasp-threat-dragon

Use OWASP Threat Dragon to create data flow diagrams, identify threats using STRIDE and LINDDUN methodologies, and generate threat model reports for secure design review.

plurigrid
plurigrid
165

performing-timeline-reconstruction-with-plaso

Build comprehensive forensic super-timelines using Plaso (log2timeline) to correlate events across file systems, logs, and artifacts into a unified chronological view.

plurigrid
plurigrid
165

performing-user-behavior-analytics

>

plurigrid
plurigrid
165

performing-vlan-hopping-attack

>

plurigrid
plurigrid
165

Page 299 of 1445 · 72246 results