837 results (21.7ms) page 20 / 42
Ianfr13 / claude-code-plugins-wrangler exact

Cloudflare Workers CLI for deploying, developing, and managing Workers, KV, R2, D1, Vectorize, Hyperdrive, Workers AI, Containers, Queues, Workflows, Pipelines, and Secrets Store. Load before...

netsapiensis / claude-code-skills-rocky-networking exact

Rocky Linux 8/9 networking including firewalld zones/services/rich rules, nmcli connection management, bonding, VLANs, static routes, DNS, and port forwarding. Use when configuring network...

rknall / claude-skills-gitlab-stack-config-generator exact

Generates service-specific configuration files for GitLab stack projects in ./config directory, using .env as the primary configuration source. Creates nginx, PostgreSQL, Redis, and custom service...

acedergren / oci-agent-skills-oci-best-practices-and-architecture exact

Use when architecting OCI solutions, migrating from AWS/Azure, designing multi-AD deployments, or avoiding common OCI anti-patterns. Covers VCN sizing mistakes, Cloud Guard gotchas, free tier...

daffy0208 / ai-dev-standards-security-engineer exact

Implement security best practices across the application stack. Use when securing APIs, implementing authentication, preventing vulnerabilities, or conducting security reviews. Covers OWASP Top...

synapz-org / basilica-miner-claude-skill exact

This skill should be used when setting up, managing, or troubleshooting Basilica GPU miner operations on Bittensor Subnet 39 (mainnet) or 387 (testnet). Use it for GPU provider tasks including SSH...

glittercowboy / taches-cc-resources-create-meta-prompts exact

Create optimized prompts for Claude-to-Claude pipelines with research, planning, and execution stages. Use when building prompts that produce outputs for other prompts to consume, or when running...

cosmix / loom-kubernetes exact

Kubernetes deployment, cluster architecture, security, and operations. Includes manifests, Helm charts, RBAC, network policies, troubleshooting, and production best practices. Trigger keywords:...

cm 0.00
Mrc220 / agent-flywheel-clawdbot-skills-and-integrations-cm exact

CASS Memory System - procedural memory for AI coding agents. Three-layer cognitive architecture with confidence decay, anti-pattern learning, cross-agent knowledge transfer, trauma guard safety...

cm 0.00
Dicklesworthstone / agent-flywheel-clawdbot-skills-and-integrations-cm exact

CASS Memory System - procedural memory for AI coding agents. Three-layer cognitive architecture with confidence decay, anti-pattern learning, cross-agent knowledge transfer, trauma guard safety...

prgrmrwy / ai-tools-skill-get exact

Unified installer for Claude Code Skills from multiple sources. Triggered when users request to install skills, search for skills, list installed skills, update skills, query supported...

pptx 0.00
aisa-group / promptinject-agent-skills-pptx exact

Presentation creation, editing, and analysis. When Claude needs to work with presentations (.pptx files) for: (1) Creating new presentations, (2) Modifying or editing content, (3) Working with...

aisa-group / promptinject-agent-skills-presentation exact

Presentation creation, editing, and analysis. When Claude needs to work with presentations (.pptx files) for: (1) Creating new presentations, (2) Modifying or editing content, (3) Working with...

rknall / claude-skills-gitlab-stack-creator exact

Create new GitLab stack projects from templates with proper directory structure, git configuration, validation hooks, and documentation. Use when initializing new Docker stack projects that follow...

natea / fitfinder-github-project-management exact

Comprehensive GitHub project management with swarm-coordinated issue tracking, project board automation, and sprint planning

proffesor-for-testing / agentic-qe-github-project-management exact

Comprehensive GitHub project management with swarm-coordinated issue tracking, project board automation, and sprint planning

BrownFineSecurity / iothackbot-picocom exact

Use picocom to interact with IoT device UART consoles for pentesting operations including device enumeration, vulnerability discovery, bootloader manipulation, and gaining root shells. Use when...