π―Skills6
Validates and manages authentication credentials across different security testing scenarios, supporting token-based, OAuth, and multi-factor authentication workflows.
Maps web applications by systematically discovering endpoints, technologies, and potential vulnerabilities through coordinated reconnaissance and automated scanning techniques.
Systematically identifies technology stack vulnerabilities, researches known CVEs, and validates exploitability using public proof-of-concept code.
Systematically tests LLM applications for OWASP Top 10 AI vulnerabilities through automated penetration testing and exploit discovery.
Identifies and analyzes common application security vulnerability patterns across different software architectures and technology stacks.
Assesses domain security posture by scanning DNS records, identifying potential vulnerabilities, and generating comprehensive domain risk profiles.