346 results (5.3ms) page 15 / 18
shishiv / gsd-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

halay08 / fullstack-agent-skills-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

404kidwiz / agent-skills-backup-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

sickn33 / antigravity-awesome-skills-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

cleodin / antigravity-awesome-skills-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

ngxtm / devkit-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

zebbern / claude-code-guide-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

eugenepyvovarov / mcpbundler-agent-skills-marketplace-code-recon exact

Build deep architectural understanding through ultra-granular code analysis. Use when doing security audits, code reviews, or getting oriented in an unfamiliar codebase.

sendaifun / skills-zz-code-recon exact

Deep architectural context building for security audits. Use when conducting security reviews, building codebase understanding, mapping trust boundaries, or preparing for vulnerability analysis....

dirnbauer / webconsulting-skills-security-incident-reporting exact

Security Incident Report templates drawing from NIST/SANS. DDoS post-mortem, CVE correlation, timeline documentation, and blameless root cause analysis.

mvp 0.00
g6000 / ultrafast-mvp-skills-mvp exact

Ultra-fast MVP delivery playbook for coding agents (Next.js + Vercel + Supabase; optional Vercel Workflow jobs)

DauQuangThanh / hanoi-rainbow-jcl-migration-analyzer exact

Analyzes legacy JCL (Job Control Language) scripts to assist with migration to modern workflow orchestration and batch processing systems. Extracts job flows, step sequences, data dependencies,...

TencentCloudBase / skills-cloud-functions exact

Complete guide for CloudBase cloud functions development - runtime selection, deployment, logging, invocation, and HTTP access configuration.

volter-ai / runhuman-skills exact

Create and manage human-powered QA tests using Runhuman CLI. Use this skill when you need to test web applications with real human testers, get UX feedback, validate user flows, check mobile...

mindrally / skills-netlify-development exact

Netlify development best practices for serverless functions, edge functions, Blobs storage, build configuration, and deployment workflows.

alinaqi / claude-bootstrap-security exact

OWASP security patterns, secrets management, security testing

payloadcms / skills-payload exact

Use when working with Payload projects (payload.config.ts, collections, fields, hooks, access control, Payload API). Use when debugging validation errors, security issues, relationship queries,...

noklip-io / agent-skills-payload exact

Use when working with Payload CMS projects (payload.config.ts, collections, fields, hooks, access control, Payload API). Use when debugging validation errors, security issues, relationship...

aj-geddes / useful-ai-prompts-secrets-rotation exact

Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing secrets lifecycle, compliance requirements, or security hardening.

eddiebe147 / claude-settings-monitoring-setup exact

Expert guide for setting up monitoring dashboards, alerting, metrics collection, and observability. Use when implementing application monitoring, setting up alerts, or building dashboards.