4920 results (37.8ms) page 19 / 246
ngxtm / devkit-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

sickn33 / antigravity-awesome-skills-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

cleodin / antigravity-awesome-skills-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

zebbern / claude-code-guide-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

404kidwiz / agent-skills-backup-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

automindtechnologie-jpg / ultimate-skill-md-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

halay08 / fullstack-agent-skills-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

Yeachan-Heo / oh-my-claudecode-analyze exact

Deep analysis and investigation

bitwize-music-studio / claude-ai-music-skills-researcher exact

Investigative-grade research: primary source analysis, cross-verification, trial-level depth

404kidwiz / claude-supercode-skills-incident-responder exact

Use when user needs security incident response, operational incident management, evidence collection, forensic analysis, or coordinated response for outages and breaches.

cosmix / loom-threat-model exact

Threat modeling methodologies (STRIDE, DREAD, PASTA, attack trees) for secure architecture design. Use when planning new systems, reviewing architecture security, identifying threats, or assessing...

bntvllnt / agent-skills-analyze exact

Universal multi-perspective analyzer for any topic, file, idea, or decision. Extract key points, find gaps/risks, identify improvements with actionable plans.

xlsx 0.00
zartin790 / llm-system-template-agents-skills-patterns-tools-prompts-xlsx exact

'Comprehensive spreadsheet creation, editing, and analysis with support

halay08 / fullstack-agent-skills-business-analyst exact

Master modern business analysis with AI-powered analytics,