'Performs purple team exercises by coordinating red team adversary emulation with blue team detection validation
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →'Performs purple team exercises by coordinating red team adversary emulation with blue team detection validation
'Executes a structured ransomware incident response from initial detection through containment, forensic analysis,
'Plans and facilitates tabletop exercises simulating ransomware incidents to test organizational readiness, decision-making,
Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener
'This skill covers implementing Software Composition Analysis (SCA) using Snyk to detect vulnerable open-source
'Perform security assessments of SCADA Human-Machine Interface (HMI) systems to identify vulnerabilities in web-based
'Performing security reviews of serverless functions across AWS Lambda, Azure Functions, and GCP Cloud Functions
Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant
Automate credential rotation for service accounts across Active Directory, cloud platforms, and application databases
Perform security testing of SOAP web services by analyzing WSDL definitions and testing for XML injection, XXE,
'Performs tabletop exercises for SOC teams simulating security incidents through discussion-based scenarios to
'Automates SOC 2 Type II audit preparation including gap assessment against AICPA Trust Services Criteria (CC1-CC9),
Configure SSL/TLS inspection on network security devices to decrypt, inspect, and re-encrypt HTTPS traffic for
'Performs static analysis of Windows PE (Portable Executable) malware samples using PEStudio to examine file
Detect and extract hidden data embedded in images, audio, and other media files using steganalysis tools to uncover
'Executes Atomic Red Team tests for MITRE ATT&CK technique validation using the atomic-operator Python framework.
'Performs proactive threat hunting in Elastic Security SIEM using KQL/EQL queries, detection rules, and Timeline
Use OWASP Threat Dragon to create data flow diagrams, identify threats using STRIDE and LINDDUN methodologies,
Build comprehensive forensic super-timelines using Plaso (log2timeline) to correlate events across file systems,
'Simulates VLAN hopping attacks using switch spoofing and double tagging techniques in authorized environments
'Performs authenticated and unauthenticated vulnerability scanning using Tenable Nessus to identify known vulnerabilities,
'Performs systematic security testing of web applications following the OWASP Web Security Testing Guide (WSTG)
Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to
Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers
Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through
'Captures WPA/WPA2 handshakes and performs offline password cracking using aircrack-ng, hashcat, and dictionary
Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including
Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3
Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak
Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral
The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum
'Develops comprehensive threat actor profiles for APT groups, criminal organizations, and hacktivist collectives
Recover deleted files from disk images and storage media using PhotoRec's file signature-based carving engine
'Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment
'Reverse engineers malicious Android APK files using JADX decompiler to analyze Java/Kotlin source code, identify
'Reverse engineers .NET malware using dnSpy decompiler and debugger to analyze C#/VB.NET source code, identify
'Reverse engineers malware binaries using NSA''s Ghidra disassembler and decompiler to understand internal logic,
Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and
Scan container images for known vulnerabilities using Anchore Grype with SBOM-based matching and configurable
'This skill covers integrating Aqua Security''s Trivy scanner into CI/CD pipelines for comprehensive container
Trivy is a comprehensive open-source vulnerability scanner by Aqua Security that detects vulnerabilities in OS
Perform security risk analysis on Kubernetes resource manifests using Kubesec to identify misconfigurations,
'This skill guides practitioners through hardening AWS Identity and Access Management configurations to enforce
'Securing AWS Lambda execution roles by implementing least-privilege IAM policies, applying permission boundaries,
'Securing container registry images by implementing vulnerability scanning with Trivy and Grype, enforcing image
Harbor is an open-source container registry that provides security features including vulnerability scanning
'This skill covers hardening managed Kubernetes clusters on EKS, AKS, and GKE by implementing Pod Security Standards,
'This skill covers security hardening for serverless compute platforms including AWS Lambda, Azure Functions,
'Tests API authentication mechanisms for weaknesses including broken token validation, missing authentication
'Tests REST and GraphQL APIs for Broken Object Level Authorization (BOLA/IDOR) vulnerabilities where an authenticated