Research and extract an engineer's coding style, patterns, and best practices from their GitHub contributions. Creates structured knowledge base for replicating their expertise.
Use when testing plans or decisions for blind spots, need adversarial review before launch, validating strategy against worst-case scenarios, building consensus through structured debate,...
Guide for understanding anti-cheat systems and bypass techniques. Use this skill when researching game protection systems (EAC, BattlEye, Vanguard), anti-cheat architecture, detection methods, or...
Perform comprehensive code reviews using Google Gemini CLI to identify bugs, security vulnerabilities, performance issues, and code quality problems. Use after code changes, before commits, during...
Use picocom to interact with IoT device UART consoles for pentesting operations including device enumeration, vulnerability discovery, bootloader manipulation, and gaining root shells. Use when...
Android APK decompiler that converts DEX bytecode to readable Java source code. Use when you need to decompile APK files, analyze app logic, search for vulnerabilities, find hardcoded credentials,...
Use telnet to interact with IoT device shells for pentesting operations including device enumeration, vulnerability discovery, credential testing, and post-exploitation. Use when the user needs to...
Claude Code skill for running structured security audits with actionable remediation plans
Security audit workflow - vulnerability scan β verification
Security audit workflow - vulnerability scan β verification
Write academic conference papers and research submissions
Deep competitive intelligence combining web scraping, LinkedIn data, social media monitoring, leadership analysis, GitHub activity, Glassdoor sentiment, and community insights. Analyzes...
Expert guidance for designing and implementing onboarding flows in recovery, wellness, and mental health applications. This skill should be used when building onboarding experiences, first-time...
Promote resolved thinking sessions into formalized research documents
JavaScript security best practices and vulnerability prevention.
Scan code and infrastructure for security vulnerabilities and compliance issues
Migration workflow - research β analyze β plan β implement β review
Migration workflow - research β analyze β plan β implement β review
Security analysis, vulnerability assessment, and security code reviews
Check version compatibility, breaking changes, and security vulnerabilities