Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Guides users through a structured methodology for planning, executing, and managing professional penetration testing engagements.
Identifies and prioritizes code vulnerabilities using OWASP 2025 standards, supply chain auditing, and attack surface mapping.
Autonomously transforms entire codebases into enterprise-grade, production-ready software through deep-scan audits and automated refactoring.
Facilitates comprehensive penetration testing and security audits of Microsoft Active Directory environments.
Provides comprehensive techniques and automated workflows for escalating privileges on compromised Linux and Windows systems during security assessments.
Enforces rigorous evidence-based reporting and command verification before any task is marked as complete or successful.
Streamlines the implementation of Clerk authentication and authorization patterns in Next.js applications.
Implements robust testing strategies using Jest, TDD workflows, and factory patterns for maintainable codebases.
Transforms codebases into enterprise-grade software by performing autonomous deep-scans for security, performance, and architectural vulnerabilities.
Implements secure, framework-agnostic authentication and authorization systems using the Better Auth TypeScript framework.
Identifies and evaluates authentication and session management vulnerabilities in web applications to prevent unauthorized access and identity theft.
Transforms entire codebases into production-grade, enterprise-level systems through autonomous deep-scanning and systematic optimization.
Provides comprehensive methodologies and technical commands for escalating system privileges on Linux and Windows environments.
Conducts comprehensive security assessments and fuzzing across REST, SOAP, and GraphQL APIs to identify vulnerabilities like IDOR and injection.
Identifies and evaluates authentication and session management vulnerabilities in web applications to prevent unauthorized access and account takeovers.
Systematically identifies and resolves failing tests using intelligent error grouping and prioritized fixing strategies.
Conducts comprehensive reconnaissance on internet-connected devices and services using the Shodan search engine, CLI, and API.
Automates network reconnaissance and vulnerability discovery using Shodan to identify exposed internet-connected devices and services.
Enforces a strict verification protocol requiring fresh command output and evidence before any work is claimed as complete.
Facilitates comprehensive security assessments and penetration testing of Microsoft Active Directory environments through guided reconnaissance and exploitation workflows.
Analyzes network traffic and packet captures using Wireshark to troubleshoot connectivity and investigate security incidents.
Configures and tests network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing labs.
Provides systematic methodologies and workflows for identifying, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Enforces rigorous evidence-based verification before any task is marked as finished, committed, or merged.
Guides comprehensive API security testing and vulnerability discovery across REST, GraphQL, and SOAP architectures.
Provides a comprehensive toolkit for automating and testing local web applications using Playwright and automated server management.
Automates deep QA processes including edge case verification, code quality audits, and comprehensive test reporting.
Automates frontend testing and browser interactions for local web applications using Playwright scripts.
Guides users through the complete penetration testing lifecycle from reconnaissance and scanning to exploitation and professional reporting.
Implements a rigorous Test-Driven Development cycle to ensure high-quality, bug-free code through iterative Red-Green-Refactor patterns.
Scroll for more results...