4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

business-logic-testing

Ed1s0nZ

564

Specializes in identifying and mitigating vulnerabilities in application business logic through systematic security testing methodologies.

Business Logic
Vulnerability Testing
Security Assessment
4. Security & Compliance

network-penetration-testing

Ed1s0nZ

564

Conducts ethical network penetration testing to identify and exploit security vulnerabilities in systems and infrastructure.

Penetration Testing
Network Security
Vulnerability Assessment
4. Security & Compliance

ssrf-testing

Ed1s0nZ

564

Specialized methodology for identifying and testing Server-Side Request Forgery (SSRF) vulnerabilities in web applications.

SSRF
Penetration Testing
Web Security
4. Security & Compliance

file-upload-testing

Ed1s0nZ

564

Specializes in identifying and testing security vulnerabilities in file upload mechanisms to prevent exploitation.

File Upload Vulnerability
Penetration Testing
Security Assessment
4. Security & Compliance

idor-testing

Ed1s0nZ

564

Performs security testing for Insecure Direct Object Reference (IDOR) vulnerabilities in web applications to identify unauthorized resource access risks.

IDOR
Security Testing
Vulnerability Assessment
4. Security & Compliance

ldap-injection-testing

Ed1s0nZ

564

Tests for LDAP injection vulnerabilities in directory services to identify and mitigate security risks in authentication systems.

LDAP Injection
Penetration Testing
Vulnerability Assessment
4. Security & Compliance

cloud-security-audit

Ed1s0nZ

564

Conducts comprehensive cloud security audits to identify vulnerabilities and ensure compliance with security standards.

Cloud Security
Compliance
Vulnerability Assessment
4. Security & Compliance

csrf-testing

Ed1s0nZ

564

Provides professional methodologies for identifying and testing Cross-Site Request Forgery (CSRF) vulnerabilities in web applications.

CSRF
Penetration Testing
Web Security
4. Security & Compliance

xpath-injection-testing

Ed1s0nZ

564

Tests web applications for XPath injection vulnerabilities to prevent unauthorized data access and enhance security posture.

XPath Injection
Penetration Testing
Web Security
4. Security & Compliance

security-awareness-training

Ed1s0nZ

564

Delivers structured security awareness training programs to educate employees on security best practices and compliance requirements.

Security Awareness
Compliance
Security Training
4. Security & Compliance

deserialization-testing

Ed1s0nZ

564

Specializes in identifying and testing deserialization vulnerabilities to prevent security breaches in applications.

Deserialization
Vulnerability Testing
Penetration Testing
4. Security & Compliance

vulnerability-assessment

Ed1s0nZ

564

Systematically identifies, analyzes, and prioritizes security vulnerabilities in systems and applications to mitigate risks.

Vulnerability Assessment
Security Audit
Penetration Testing
4. Security & Compliance

incident-response

Ed1s0nZ

564

Provides structured methodologies for detecting, containing, and mitigating security incidents in enterprise environments.

Incident Response
Security Operations
Threat Mitigation
4. Security & Compliance

api-security-testing

Ed1s0nZ

564

Conducts security assessments on APIs to detect vulnerabilities and ensure secure communication protocols.

API Security
Penetration Testing
OWASP
4. Security & Compliance

container-security-testing

Ed1s0nZ

564

Provides methodologies for identifying and mitigating security vulnerabilities in containerized applications and their images.

Docker
Vulnerability Scanning
Image Scanning
4. Security & Compliance

moai-platform-clerk

modu-ai

559

Specializes in implementing Clerk's modern authentication solutions with WebAuthn, passkeys, and passwordless login for secure, user-friendly authentication flows.

WebAuthn
Passkeys
Passwordless
4. Security & Compliance

moai-platform-auth0

modu-ai

559

Auth0 security specialist for implementing attack protection, MFA, token security, and compliance configuration.

Auth0
MFA
Compliance
4. Security & Compliance

picocom

BrownFineSecurity

505

Enables security pentesting of IoT devices through UART console interaction for device enumeration, vulnerability discovery, and root shell acquisition.

UART
IoT
Pentesting
4. Security & Compliance

jadx

BrownFineSecurity

505

Decompiles Android APK files into readable Java source code for security analysis, vulnerability detection, and app behavior inspection.

APK
Decompiler
Android
4. Security & Compliance

iotnet

BrownFineSecurity

505

Analyzes IoT network traffic to detect protocols and identify security vulnerabilities in device communications.

IoT Protocols
Network Security
Vulnerability Assessment
4. Security & Compliance

wsdiscovery

BrownFineSecurity

505

Scans networks to discover ONVIF cameras and WS-Discovery enabled IoT devices, aiding in security assessment and device inventory.

WS-Discovery
ONVIF
Network Scanning
4. Security & Compliance

apktool

BrownFineSecurity

505

Unpacks, analyzes, and repackages Android APK files to extract resources, examine manifests, and analyze smali code for security assessment.

APK
Reverse Engineering
Smali
4. Security & Compliance

onvifscan

BrownFineSecurity

505

Scans ONVIF devices for security vulnerabilities through authentication testing and brute-force credential checks.

ONVIF
Brute-force
Penetration Testing
4. Security & Compliance

nmap

BrownFineSecurity

505

Professional network reconnaissance and port scanning tool supporting multiple scan types, service detection, and vulnerability scanning via NSE scripts.

port scanning
vulnerability scanning
NSE
4. Security & Compliance
PreviousPage 23 of 151 PageNext