40 results (83.9ms) page 2 / 2
hardw00t / ai-security-arsenal-api-security exact

Comprehensive API security testing skill for REST, GraphQL, gRPC, and WebSocket APIs. This skill should be used when performing API penetration testing, testing for OWASP API Top 10...

omer-metin / skills-for-antigravity-security-owasp exact

Expert at securing web applications against OWASP Top 10 vulnerabilities. Covers authentication, authorization, input validation, XSS prevention, CSRF protection, secure headers, and security...

sickn33 / antigravity-awesome-skills-aws-penetration-testing exact

This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...

test 0.20
parcadei / continuous-claude-v3-test exact

Comprehensive testing workflow - unit tests βˆ₯ integration tests β†’ E2E tests

hardw00t / ai-security-arsenal-container-security exact

Container and Kubernetes security assessment skill for Docker, Kubernetes, and container orchestration platforms. This skill should be used when scanning container images for vulnerabilities,...

erichowens / some-claude-skills-test-automation-expert exact

Comprehensive test automation specialist covering unit, integration, and E2E testing strategies. Expert in Jest, Vitest, Playwright, Cypress, pytest, and modern testing frameworks. Guides test...

ngxtm / devkit-test-master exact

Use when writing tests, creating test strategies, or building automation frameworks. Invoke for unit tests, integration tests, E2E, coverage analysis, performance testing, security testing.

Jeffallan / claude-skills-test-master exact

Use when writing tests, creating test strategies, or building automation frameworks. Invoke for unit tests, integration tests, E2E, coverage analysis, performance testing, security testing.

aj-geddes / useful-ai-prompts-penetration-testing exact

Ethical hacking and security testing methodologies using penetration testing tools, exploit frameworks, and manual security validation. Use when assessing application security posture and...