Communications skill for internal communications, press releases, messaging, crisis communication, and stakeholder updates. Use when crafting announcements, managing communications, or handling...
|
Insurance policy analysis, claims evaluation, coverage assessment, and risk management for individuals and businesses
Contrast ratios for text, focus indicators, UI components
|
Reddit Ads API - campaigns, targeting, conversions, agentic optimization
Validate CLAUDE.md structure and completeness
Understand anti-reversing, obfuscation, and protection techniques encountered during software analysis. Use when analyzing protected binaries, bypassing anti-debugging for authorized analysis, or...
Understand anti-reversing, obfuscation, and protection techniques encountered during software analysis. Use when analyzing protected binaries, bypassing anti-debugging for authorized analysis, or...
Understand anti-reversing, obfuscation, and protection techniques encountered during software analysis. Use when analyzing protected binaries, bypassing anti-debugging for authorized analysis, or...
Understand anti-reversing, obfuscation, and protection techniques encountered during software analysis. Use when analyzing protected binaries, bypassing anti-debugging for authorized analysis, or...
Manage enterprise contracts with Ironclad's digital contracting platform.
Rakip analizi, SEO/strateji karşılaştırma ve pazar pozisyonlama rehberi.
Pre-implementation confidence assessment (≥90% required). Use before starting any implementation to verify readiness with duplicate check, architecture compliance, official docs verification, OSS...
Pre-implementation confidence assessment (≥90% required). Use before starting any implementation to verify readiness with duplicate check, architecture compliance, official docs verification, OSS...
|
|
Showcase and discover creative work on Behance - manage portfolio projects, explore design trends, and connect with creatives
Agent assignment matrix, blocker escalation, and TDM coordination patterns. Use when assigning work to specialists, managing blockers, or coordinating multi-agent workflows.
Hunter-grade guidance for using nuclei as a precision vulnerability verification tool, dynamically selecting templates, controlling scan aggression, and validating real exploitable findings based...