5122 results (39.5ms) page 13 / 257
hardw00t / ai-security-arsenal-sast-orchestration exact

Static Application Security Testing orchestration skill for running and managing SAST tools across codebases. This skill should be used when performing static code analysis, writing custom...

sickn33 / antigravity-awesome-skills-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

martinholovsky / claude-skills-generator-appsec-expert exact

Elite Application Security engineer specializing in secure SDLC, OWASP Top 10 2025, SAST/DAST/SCA integration, threat modeling (STRIDE), and vulnerability remediation. Expert in security testing,...

lyndonkl / claude-chain-estimation-decision-storytelling exact

Use when making high-stakes decisions under uncertainty that require stakeholder buy-in. Invoke when evaluating strategic options (build vs buy, market entry, resource allocation), quantifying...

sickn33 / antigravity-awesome-skills-aws-penetration-testing exact

This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...

sickn33 / antigravity-awesome-skills-api-fuzzing-for-bug-bounty exact

This skill should be used when the user asks to "test API security", "fuzz APIs", "find IDOR vulnerabilities", "test REST API", "test GraphQL", "API penetration testing", "bug bounty API testing",...

sickn33 / antigravity-awesome-skills-docker-expert exact

Docker containerization expert with deep knowledge of multi-stage builds, image optimization, container security, Docker Compose orchestration, and production deployment patterns. Use PROACTIVELY...

sickn33 / antigravity-awesome-skills-smtp-penetration-testing exact

This skill should be used when the user asks to "perform SMTP penetration testing", "enumerate email users", "test for open mail relays", "grab SMTP banners", "brute force email credentials", or...

martinholovsky / claude-skills-generator-celery-expert exact

Expert Celery distributed task queue engineer specializing in async task processing, workflow orchestration, broker configuration (Redis/RabbitMQ), Celery Beat scheduling, and production...

aj-geddes / useful-ai-prompts-vulnerability-scanning exact

Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing security audits, compliance checks, or continuous security monitoring.

cosmix / loom-threat-model exact

Threat modeling methodologies (STRIDE, DREAD, PASTA, attack trees) for secure architecture design. Use when planning new systems, reviewing architecture security, identifying threats, or assessing...

halay08 / fullstack-agent-skills-security-compliance-compliance-check exact

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform compliance audits and provide...

404kidwiz / agent-skills-backup-security-compliance-compliance-check exact

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform compliance audits and provide...

rmyndharis / antigravity-skills-security-compliance-compliance-check exact

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform compliance audits and provide...

lyndonkl / claude-chain-roleplay-debate-synthesis exact

Use when facing decisions with multiple legitimate perspectives and inherent tensions. Invoke when stakeholders have competing priorities (growth vs. sustainability, speed vs. quality, innovation...

ovachiever / droid-tings-senior-secops exact

Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices. Includes security scanning, vulnerability assessment, compliance...