Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Guides comprehensive security assessments for REST, GraphQL, and SOAP APIs to identify vulnerabilities like IDOR, injection attacks, and authentication bypasses.
Automates network reconnaissance and vulnerability discovery using the Shodan search engine to identify exposed internet-connected devices and services.
Conducts comprehensive security audits and penetration testing on Amazon Web Services environments to identify vulnerabilities and privilege escalation paths.
Implements a structured Test-Driven Development (TDD) methodology for Node.js and TypeScript projects to ensure code quality and reliability.
Automates security reconnaissance and bug bounty hunting workflows using proven red team methodologies and expert tool configurations.
Audits Claude Code components for effectiveness, security, and usability through systematic quality scoring and optimization suggestions.
Simplifies the implementation of secure user authentication and session management using Clerk for modern web applications.
Provides comprehensive workflows and tool commands for identifying vulnerabilities and executing advanced penetration testing techniques in Microsoft Active Directory environments.
Streamlines penetration testing workflows by providing comprehensive guidance for the Metasploit Framework and its suite of exploitation tools.
Manages security policies, privacy compliance, and risk assessments to ensure organizational data integrity and regulatory adherence.
Provides comprehensive guidance for performing penetration testing, vulnerability exploitation, and post-exploitation tasks using the Metasploit Framework.
Facilitates the pre-testing phase of TDD by uncovering ambiguities, defining acceptance criteria, and identifying edge cases before code is written.
Enforces a mandatory verification protocol requiring empirical evidence before claiming any task completion or code success.
Guides the development process through the Red-Green-Refactor cycle to ensure robust, test-backed code implementation.
Standardizes the planning, execution, and remediation phases of security penetration testing with structured methodologies and best practices.
Conducts comprehensive reconnaissance on internet-connected devices and services using the Shodan search engine, CLI, and API.
Performs advanced security audits and vulnerability analysis using OWASP 2025 standards and supply chain security principles.
Systematically identifies, groups, and resolves failing test suites using an optimized infrastructure-first debugging strategy.
Enforces a rigorous Red-Green-Refactor cycle to ensure all production code is preceded by a failing test.
Validates, tests, and ensures the quality of Violet AI plugins before deployment to maintain structural consistency and reliability.
Builds comprehensive, executable test coverage for mission-critical paths while eliminating empty stubs and vanity metrics.
Invokes high-reasoning models to perform deep analysis, complex debugging, and architectural reviews for your codebase.
Hardens Kubernetes clusters using zero-trust models, RBAC design, and automated policy enforcement for production-grade security.
Generates and executes end-to-end browser tests using AI-driven automation for complex user journeys and authenticated flows.
Develops privacy-preserving Account Abstraction wallets for vehicle identity and sensitive data management using ERC-4337 standards.
Validates and audits Claude Code skills and agents against architectural, implementation, and storage standards.
Reviews source code for vulnerabilities and provides actionable remediation steps to harden applications against cyber threats.
Validates Claude Code skills, commands, agents, hooks, and plugins against specifications and best practices to ensure structural integrity and quality standards.
Implements robust secrets management and rotation strategies across CI/CD pipelines and cloud environments to protect sensitive credentials.
Implements secure handling of credentials and sensitive data within CI/CD pipelines and cloud environments.
Scroll for more results...