Discover Agent Skills for security & testing. Browse 105skills for Claude, ChatGPT & Codex.
Enforces a strict Red-Green-Refactor workflow by requiring failing tests before any production code implementation.
Executes Go unit tests requiring the Spanner emulator by automating environment configuration and lifecycle management.
Facilitates the identification and testing of privilege escalation paths on Linux and Windows systems for authorized security audits.
Performs comprehensive security assessments and vulnerability scanning on WordPress installations to identify and mitigate risks.
Provides systematic methodologies and commands for discovering and exploiting privilege escalation vulnerabilities on Windows systems.
Conducts thorough security assessments and ethical hacking operations within Amazon Web Services environments.
Identifies and exploits security misconfigurations, kernel vulnerabilities, and system weaknesses to elevate user privileges on Linux systems.
Conducts comprehensive security audits of SMTP servers to identify vulnerabilities like open relays, user enumeration, and weak authentication.
Conducts comprehensive security audits and penetration tests across major cloud providers including AWS, Azure, and GCP.
Analyzes network traffic, captures packets, and troubleshoots connectivity using advanced Wireshark filtering and protocol analysis techniques.
Guides users through the complete penetration testing lifecycle with domain-specific techniques for authorized security assessments.
Conducts comprehensive penetration testing and vulnerability assessments using the Metasploit Framework.
Conducts systematic security audits to identify and mitigate Insecure Direct Object Reference (IDOR) vulnerabilities in web applications and APIs.
Conducts comprehensive security audits for HTML injection vulnerabilities to protect web applications from content manipulation and phishing attacks.
Provides comprehensive methodologies and command workflows for assessing security vulnerabilities within Microsoft Active Directory environments.
Provides comprehensive definitions, root causes, and remediation strategies for the top 100 web application security flaws.
Configures and tests essential network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing labs.
Identifies and tests for directory traversal vulnerabilities to ensure secure filesystem access in web applications.
Provides comprehensive techniques and automated workflows for identifying vulnerabilities in REST, GraphQL, and SOAP APIs.
Conducts comprehensive SSH security assessments including enumeration, credential testing, and vulnerability exploitation.
Provides a structured methodology and comprehensive checklist for planning, executing, and remediating penetration tests.
Performs comprehensive SQL injection vulnerability assessments to identify security flaws and validate input sanitization in web applications.
Conducts comprehensive security audits to identify, exploit, and remediate client-side injection vulnerabilities in web applications.
Conducts comprehensive security audits and vulnerability assessments using industry-standard scanning tools and methodologies.
Conducts comprehensive security audits for authentication mechanisms and session management to identify vulnerabilities like credential stuffing and session fixation.
Automates SQL injection vulnerability detection and database exploitation using industry-standard SQLMap methodologies.
Provides an extensive reference library of penetration testing commands and workflows for security auditing and network scanning.
Leverages the Shodan search engine to identify exposed devices, vulnerable services, and IoT infrastructure during security assessments.
Performs comprehensive web application security audits by intercepting, analyzing, and modifying HTTP traffic using Burp Suite's professional toolset.
Automates reconnaissance, vulnerability discovery, and security auditing using industry-standard red team methodologies.
Scroll for more results...