4. Security & Compliance
Found 3608 skills
redteam
danielmiessler
Provides adversarial analysis with 32 agents for red team exercises, including attack simulation, counterarguments, and stress testing.
annualreports
danielmiessler
Aggregates and analyzes annual security, threat, and industry reports to provide threat landscape insights and security analysis.
recon
danielmiessler
Provides security reconnaissance capabilities to identify vulnerabilities and attack surfaces, particularly for bug bounty programs and penetration testing.
redteam
danielmiessler
Simulates adversarial attacks and security stress tests using 32 agents for red teaming and vulnerability assessment.
system
danielmiessler
Manages system integrity, documents sessions, and performs security audits including secret and privacy scans for compliance.
ld-permissions
lightdash
Guide for implementing and debugging Lightdash's CASL-based authorization system, covering scopes, roles, and permission flows.
idapython
mrexodia
Enables binary analysis and reverse engineering through IDAPython scripting, leveraging IDA Pro's API for disassembly, decompilation, and cross-referencing.
hunt-data-source-identification
OTRF
Identifies security data sources from platform catalogs to capture behavior defined in structured hunt hypotheses, supporting threat hunt planning.
hunt-focus-definition
OTRF
Synthesizes system internals and adversary research to define a structured, testable security hunt hypothesis for targeted threat investigation.
hunt-research-system-and-tradecraft
OTRF
Researches system internals and adversary tradecraft to inform threat hunting strategies, providing candidate abuse patterns and sources before hypothesis formation.
hunt-blueprint-generation
OTRF
Consolidates prior security research, tradecraft, and analytics into a structured hunt blueprint without new research or assumptions.
security-scan
redpanda-data
Automates resolution of security vulnerabilities in npm dependencies identified by security scanning tools.
ciso-assistant-basic-risk-assessment
intuitem
Guides users through security risk assessment workflows including asset identification, threat catalog usage, and scenario generation for risk management.
ciso-assistant-bootstrap
intuitem
Guides new users through initial setup of CISO Assistant, including organizational structure, security frameworks, and risk assessment configuration for compliance.
security
parcadei
Executes security audit workflow: vulnerability scanning followed by verification of identified issues.
explicit-identity
parcadei
Manages explicit identity propagation across system boundaries to ensure secure and consistent access control in distributed environments.
sql-injection-testing
zebbern
Identifies and exploits SQL injection vulnerabilities in web applications across multiple database systems.
privilege-escalation-methods
zebbern
Provides guidance on privilege escalation techniques including SUID abuse, Kerberoasting, and token impersonation for Linux and Windows systems.
cloud-penetration-testing
zebbern
Performs cloud penetration testing on Azure, AWS, and GCP, including resource enumeration and misconfiguration exploitation for security audits.
broken-authentication-testing
zebbern
Comprehensive testing for broken authentication vulnerabilities, session management flaws, and authentication bypass in web applications.
shodan-reconnaissance-and-pentesting
zebbern
Provides Shodan-powered reconnaissance guidance for identifying exposed devices, vulnerable services, and open ports during security assessments.
pentest-checklist
zebbern
Generates structured checklists for planning, scoping, and executing penetration testing engagements following industry best practices.
sqlmap-database-penetration-testing
zebbern
Automates SQL injection testing and database vulnerability exploitation using SQLMap for security assessments.
active-directory-attacks
zebbern
Provides guidance on Active Directory penetration testing techniques including Kerberoasting, DCSync, and other common attack vectors.