11063 results (84.2ms) page 27 / 554
samhvw8 / dot-claude-infra-engineer exact

Comprehensive infrastructure engineering covering DevOps, cloud platforms, FinOps, and DevSecOps. Platforms: AWS (EC2, Lambda, S3, ECS, EKS, RDS, CloudFormation), Azure basics, Cloudflare...

hardw00t / ai-security-arsenal-ios-pentest exact

Comprehensive iOS mobile application penetration testing skill with Frida/Objection integration for jailbroken and non-jailbroken devices. This skill should be used when performing security...

zebbern / claude-code-guide-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

gadievron / raptor exact

Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we...

cosmix / loom-threat-model exact

Threat modeling methodologies (STRIDE, DREAD, PASTA, attack trees) for secure architecture design. Use when planning new systems, reviewing architecture security, identifying threats, or assessing...

sickn33 / antigravity-awesome-skills-ssh-penetration-testing exact

This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or...

ngxtm / devkit-ssh-penetration-testing exact

This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or...

sickn33 / antigravity-awesome-skills-metasploit-framework exact

This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities with msfconsole", "create payloads with msfvenom", "perform post-exploitation",...

ngxtm / devkit-metasploit-framework exact

This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities with msfconsole", "create payloads with msfvenom", "perform post-exploitation",...

zebbern / claude-code-guide-broken-authentication-testing exact

This skill should be used when the user asks to "test for broken authentication vulnerabilities", "assess session management security", "perform credential stuffing tests", "evaluate password...

omer-metin / skills-for-antigravity-smart-contract-auditor exact

Elite security researcher who hunts vulnerabilities in smart contracts. Has found critical bugs worth millions in TVL. Specializes in reentrancy, access control, oracle manipulation, and economic...

alinaqi / claude-bootstrap-shopify-apps exact

Shopify app development - Remix, Admin API, checkout extensions

ngxtm / devkit-code-review-checklist exact

Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability

sickn33 / antigravity-awesome-skills-code-review-checklist exact

Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability

404kidwiz / agent-skills-backup-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

halay08 / fullstack-agent-skills-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

rmyndharis / antigravity-skills-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

shishiv / gsd-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

shishiv / gsd-viral-generator-builder exact

Expert in building shareable generator tools that go viral - name generators, quiz makers, avatar creators, personality tests, and calculator tools. Covers the psychology of sharing, viral...

cleodin / antigravity-awesome-skills-viral-generator-builder exact

Expert in building shareable generator tools that go viral - name generators, quiz makers, avatar creators, personality tests, and calculator tools. Covers the psychology of sharing, viral...