Loading...
Loading...
Found 77 Skills
Cryptography techniques for CTF challenges. Use when attacking encryption, hashing, ZKP, signatures, or mathematical crypto problems.
XXE XML外部实体注入测试的专业技能和方法论
Professional Skills and Methodologies for Deserialization Vulnerability Testing
Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.
Professional Skills and Methodologies for Insecure Direct Object Reference (IDOR) Testing
Security code review for vulnerabilities. Use when asked to "security review", "find vulnerabilities", "check for security issues", "audit security", "OWASP review", or review code for injection, XSS, authentication, authorization, cryptography issues. Provides systematic review with confidence-based reporting.
Professional Skills and Methodologies for LDAP Injection Vulnerability Testing
文件上传漏洞测试的专业技能和方法论
Professional Skills and Methodologies for Command Injection Vulnerability Testing
Professional Skills and Methodologies for Network Penetration Testing
Professional Skills and Methodologies for SSRF (Server-Side Request Forgery) Testing
Professional Skills and Methodologies for CSRF (Cross-Site Request Forgery) Testing