4. Security & Compliance
Found 3608 skills
file-path-traversal-testing
zebbern
Tests for directory traversal and LFI vulnerabilities in web applications using path traversal attack methodologies.
security-scanning-tools
zebbern
Provides guidance on security scanning tools and methodologies for vulnerability assessment, network scanning, web application security, and compliance evaluation.
idor-vulnerability-testing
zebbern
Guides detection, exploitation, and remediation of Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
windows-privilege-escalation
zebbern
Provides guidance for discovering and exploiting Windows privilege escalation vulnerabilities during security assessments and penetration testing.
metasploit-framework
zebbern
Provides comprehensive guidance for penetration testing, vulnerability exploitation, and post-exploitation using the Metasploit Framework.
cross-site-scripting-and-html-injection-testing
zebbern
Provides techniques for detecting, exploiting, and understanding XSS and HTML injection vulnerabilities in web applications.
wordpress-penetration-testing
zebbern
Provides comprehensive WordPress security assessments including vulnerability scanning, enumeration, and exploitation using WPScan.
ssh-penetration-testing
zebbern
Provides SSH penetration testing methodologies including configuration enumeration, credential brute-forcing, and vulnerability exploitation.
aws-penetration-testing
zebbern
Conducts AWS security assessments including penetration testing, IAM enumeration, S3 bucket analysis, and cloud service exploitation.
wireshark-network-traffic-analysis
zebbern
Provides techniques for network packet capture, filtering, and analysis using Wireshark to detect anomalies and investigate suspicious traffic.
top-100-web-vulnerabilities-reference
zebbern
Provides comprehensive reference for top 100 web vulnerabilities including definitions, root causes, impacts, and OWASP-aligned mitigation strategies.
html-injection-testing
zebbern
Tests for HTML injection vulnerabilities using proven attack techniques and methodologies to identify content injection risks.
network-101
zebbern
Provides guidance for configuring and testing network services including web servers, HTTP/HTTPS, SNMP, and SMB for penetration testing environments.
smtp-penetration-testing
zebbern
Performs SMTP server security assessments including user enumeration, open relay testing, banner grabbing, and credential brute-forcing.
burp-suite-web-application-testing
zebbern
Provides step-by-step guidance for intercepting, modifying, and testing web application requests using Burp Suite's core security features.
red-team-tools-and-methodology
zebbern
Enables red team methodology, bug bounty hunting, and vulnerability enumeration with expert security tool configurations.
linux-privilege-escalation
zebbern
Provides techniques for identifying and exploiting privilege escalation vectors on Linux systems, including SUID binaries and sudo misconfigurations.
api-fuzzing-for-bug-bounty
zebbern
Performs API security assessments including fuzzing, IDOR detection, and penetration testing for bug bounty programs.
ethical-hacking-methodology
zebbern
Provides structured ethical hacking methodology including penetration testing lifecycle, reconnaissance, vulnerability scanning, exploitation, and report writing.
pentest-commands
zebbern
Provides essential command references for penetration testing tools including Nmap, Metasploit, Hydra, and Nikto.
anti-cheat-systems
gmh5225
Guides research on game anti-cheat systems (EAC, BattlEye, Vanguard), covering architecture, detection methods, and security bypass strategies.
windows-kernel-security
gmh5225
Guides Windows kernel security research including driver development, system callbacks, PatchGuard, DSE, and kernel exploitation techniques.
reverse-engineering-tools
gmh5225
Guide to reverse engineering tools and techniques for game security research, covering debuggers, disassemblers, and binary analysis.
mobile-security
gmh5225
Provides security guidance for mobile games on Android and iOS, covering reverse engineering, anti-cheat systems, and root/jailbreak detection bypass techniques.