Detect OS credential dumping techniques targeting LSASS memory, SAM database, NTDS.dit, and cached credentials
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →Detect OS credential dumping techniques targeting LSASS memory, SAM database, NTDS.dit, and cached credentials
Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection
Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation
'Detects typosquatting attacks in npm and PyPI package registries by analyzing package name similarity using
Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter,
Systematically remove malware, backdoors, and attacker persistence mechanisms from infected systems while ensuring
'Evaluates and selects Threat Intelligence Platform (TIP) products based on organizational requirements including
'Executes authorized attack simulations against Active Directory environments to identify misconfigurations,
'Executes authorized phishing simulation campaigns to assess an organization''s susceptibility to email-based
Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE),
'Executes comprehensive red team exercises that simulate real-world adversary operations against an organization''s
Exploit misconfigured Active Directory Certificate Services (AD CS) ESC1 vulnerability to request certificates
BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and
'Tests APIs for injection vulnerabilities including SQL injection, NoSQL injection, OS command injection, LDAP
'Analyzes and simulates BGP hijacking scenarios in authorized lab environments to assess route origin validation,
'Tests APIs for Broken Function Level Authorization (BFLA) vulnerabilities where regular users can invoke administrative
Discover and exploit broken link hijacking vulnerabilities by identifying references to expired domains, decommissioned
Exploit Kerberos Constrained Delegation misconfigurations in Active Directory to impersonate privileged users
'Tests and exploits deep link (URL scheme and App Link) vulnerabilities in Android and iOS mobile applications
'Tests APIs for excessive data exposure where endpoints return more data than the client application needs, relying
Detecting and exploiting HTTP request smuggling vulnerabilities caused by Content-Length and Transfer-Encoding
Identifying and exploiting Insecure Direct Object Reference vulnerabilities to access unauthorized resources
'Identifies and exploits insecure local data storage vulnerabilities in Android and iOS mobile applications including
Identifying and exploiting insecure deserialization vulnerabilities in Java, PHP, Python, and .NET applications
'Identifies and exploits IPv6-specific vulnerabilities including SLAAC spoofing, Router Advertisement flooding,
'Exploits JWT algorithm confusion vulnerabilities where the server''s token verification library accepts the
Perform Kerberoasting attacks using Impacket's GetUserSPNs to extract and crack Kerberos TGS tickets for Active
Discover and exploit mass assignment vulnerabilities in REST APIs to escalate privileges, modify restricted fields,
MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code
Exploit the noPac vulnerability chain (CVE-2021-42278 sAMAccountName spoofing and CVE-2021-42287 KDC PAC confusion)
Detect and exploit NoSQL injection vulnerabilities in MongoDB, CouchDB, and other NoSQL databases to demonstrate
Identifying and exploiting OAuth 2.0 and OpenID Connect misconfigurations including redirect URI manipulation,
Detect and exploit JavaScript prototype pollution vulnerabilities on both client-side and server-side applications
Detect and exploit race condition vulnerabilities in web applications using Turbo Intruder's single-packet attack
Identifying and exploiting SSRF vulnerabilities to access internal services, cloud metadata, and restricted network
'Identifies and exploits SMB protocol vulnerabilities using Metasploit Framework during authorized penetration
'Identifies and exploits SQL injection vulnerabilities in web applications during authorized penetration tests
Detecting and exploiting SQL injection vulnerabilities using sqlmap to extract database contents during authorized
Detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities across Jinja2, Twig, Freemarker,
Exploit PHP type juggling vulnerabilities caused by loose comparison operators to bypass authentication, circumvent
The Metasploit Framework is the world's most widely used penetration testing platform, maintained by Rapid7.
Testing WebSocket implementations for authentication bypass, cross-site hijacking, injection attacks, and insecure
Exploit the Zerologon vulnerability (CVE-2020-1472) in the Netlogon Remote Protocol to achieve domain controller
Extract and analyze browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge
Extract embedded configuration from Agent Tesla RAT samples including SMTP/FTP/Telegram exfiltration credentials,
Extract cached credentials, password hashes, Kerberos tickets, and authentication tokens from memory dumps using
'Extracts indicators of compromise (IOCs) from malware samples including file hashes, network indicators (IPs,
'Uses Rekall memory forensics framework to analyze memory dumps for process hollowing, injected code via VAD
Extract, parse, and analyze Windows Event Logs (EVTX) using Chainsaw, Hayabusa, and EvtxECmd to detect lateral
'Generates structured cyber threat intelligence reports at strategic, operational, and tactical levels tailored