|
This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...
This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...
This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...
This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...
This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...
This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...
Compare multiple job offers side-by-side with total compensation analysis
Build an Energy Management Operating System Pack (energy drivers/drains map, calendar energy audit, zone-of-genius expansion plan, energy-aligned weekly schedule, recovery routines, and 2-week...
Translate skills from one industry to another, identify transferable skills
Create targeted resume sections optimized for different experience levels and roles
Build production ML systems with PyTorch 2.x, TensorFlow, and
Build production ML systems with PyTorch 2.x, TensorFlow, and
Build production ML systems with PyTorch 2.x, TensorFlow, and
Design a high-signal onboarding experience and produce a New Hire Onboarding Pack (preboarding checklist, first-week plan, buddy/first-pair plan, listening tour kit, working agreement, 30/60/90 +...
Comprehensive web application reconnaissance and mapping coordinator that orchestrates passive browsing, active endpoint discovery, attack surface analysis, and headless browser automation for...
Design and implement a complete ML pipeline for: $ARGUMENTS
Design and implement a complete ML pipeline for: $ARGUMENTS
Design and implement a complete ML pipeline for: $ARGUMENTS
Extract named entities from text with high accuracy and customization