4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

redteam

danielmiessler

5.5K

Provides adversarial analysis with 32 agents for red team exercises, including attack simulation, counterarguments, and stress testing.

Red Team
Adversarial Analysis
Stress Testing
4. Security & Compliance

annualreports

danielmiessler

5.5K

Aggregates and analyzes annual security, threat, and industry reports to provide threat landscape insights and security analysis.

Threat Landscape
Security Analysis
Report Aggregation
4. Security & Compliance

recon

danielmiessler

5.5K

Provides security reconnaissance capabilities to identify vulnerabilities and attack surfaces, particularly for bug bounty programs and penetration testing.

Reconnaissance
Bug Bounty
Attack Surface
4. Security & Compliance

redteam

danielmiessler

5.5K

Simulates adversarial attacks and security stress tests using 32 agents for red teaming and vulnerability assessment.

Red Teaming
Adversarial Analysis
Security Stress Testing
4. Security & Compliance

system

danielmiessler

5.5K

Manages system integrity, documents sessions, and performs security audits including secret and privacy scans for compliance.

Integrity Check
Security Audit
Secrets Scanning
4. Security & Compliance

ld-permissions

lightdash

5.5K

Guide for implementing and debugging Lightdash's CASL-based authorization system, covering scopes, roles, and permission flows.

CASL
Authorization
Access Control
4. Security & Compliance

idapython

mrexodia

5.1K

Enables binary analysis and reverse engineering through IDAPython scripting, leveraging IDA Pro's API for disassembly, decompilation, and cross-referencing.

IDAPython
Reverse Engineering
IDA API
4. Security & Compliance

hunt-data-source-identification

OTRF

4.4K

Identifies security data sources from platform catalogs to capture behavior defined in structured hunt hypotheses, supporting threat hunt planning.

Threat Hunting
Telemetry
Hunt Hypothesis
4. Security & Compliance

hunt-focus-definition

OTRF

4.4K

Synthesizes system internals and adversary research to define a structured, testable security hunt hypothesis for targeted threat investigation.

Threat Hunting
Adversary Tradecraft
Hypothesis Definition
4. Security & Compliance

hunt-research-system-and-tradecraft

OTRF

4.4K

Researches system internals and adversary tradecraft to inform threat hunting strategies, providing candidate abuse patterns and sources before hypothesis formation.

Threat Hunting
Adversary Tradecraft
System Internals
4. Security & Compliance

hunt-blueprint-generation

OTRF

4.4K

Consolidates prior security research, tradecraft, and analytics into a structured hunt blueprint without new research or assumptions.

Threat Hunting
Security Blueprint
4. Security & Compliance

security-scan

redpanda-data

4.2K

Automates resolution of security vulnerabilities in npm dependencies identified by security scanning tools.

npm
Vulnerability
Security Scans
4. Security & Compliance

ciso-assistant-basic-risk-assessment

intuitem

3.5K

Guides users through security risk assessment workflows including asset identification, threat catalog usage, and scenario generation for risk management.

Risk Assessment
Asset Identification
Threat Catalog
4. Security & Compliance

ciso-assistant-bootstrap

intuitem

3.5K

Guides new users through initial setup of CISO Assistant, including organizational structure, security frameworks, and risk assessment configuration for compliance.

CISO
Risk Assessment
Security Frameworks
4. Security & Compliance

security

parcadei

3.4K

Executes security audit workflow: vulnerability scanning followed by verification of identified issues.

Vulnerability Scan
Security Audit
Verification
4. Security & Compliance

explicit-identity

parcadei

3.4K

Manages explicit identity propagation across system boundaries to ensure secure and consistent access control in distributed environments.

Identity Federation
Explicit Identity
Security Boundaries
4. Security & Compliance

sql-injection-testing

zebbern

3.1K

Identifies and exploits SQL injection vulnerabilities in web applications across multiple database systems.

SQL Injection
Penetration Testing
Web Security
4. Security & Compliance

privilege-escalation-methods

zebbern

3.1K

Provides guidance on privilege escalation techniques including SUID abuse, Kerberoasting, and token impersonation for Linux and Windows systems.

SUID
Kerberoasting
Token Impersonation
4. Security & Compliance

cloud-penetration-testing

zebbern

3.1K

Performs cloud penetration testing on Azure, AWS, and GCP, including resource enumeration and misconfiguration exploitation for security audits.

Cloud Penetration Testing
Resource Enumeration
Cloud Misconfiguration
4. Security & Compliance

broken-authentication-testing

zebbern

3.1K

Comprehensive testing for broken authentication vulnerabilities, session management flaws, and authentication bypass in web applications.

Broken Authentication
Session Management
Credential Stuffing
4. Security & Compliance

shodan-reconnaissance-and-pentesting

zebbern

3.1K

Provides Shodan-powered reconnaissance guidance for identifying exposed devices, vulnerable services, and open ports during security assessments.

Shodan
Penetration Testing
Reconnaissance
4. Security & Compliance

pentest-checklist

zebbern

3.1K

Generates structured checklists for planning, scoping, and executing penetration testing engagements following industry best practices.

Penetration Testing
Security Assessment
Checklist
4. Security & Compliance

sqlmap-database-penetration-testing

zebbern

3.1K

Automates SQL injection testing and database vulnerability exploitation using SQLMap for security assessments.

SQLMap
SQL Injection
Penetration Testing
4. Security & Compliance

active-directory-attacks

zebbern

3.1K

Provides guidance on Active Directory penetration testing techniques including Kerberoasting, DCSync, and other common attack vectors.

Kerberoasting
DCSync
4. Security & Compliance
PreviousPage 3 of 151 PageNext