12395 results (112.1ms) page 29 / 620
cleodin / antigravity-awesome-skills-api-fuzzing-for-bug-bounty exact

This skill should be used when the user asks to "test API security", "fuzz APIs", "find IDOR vulnerabilities", "test REST API", "test GraphQL", "API penetration testing", "bug bounty API testing",...

sickn33 / antigravity-awesome-skills-api-fuzzing-for-bug-bounty exact

This skill should be used when the user asks to "test API security", "fuzz APIs", "find IDOR vulnerabilities", "test REST API", "test GraphQL", "API penetration testing", "bug bounty API testing",...

404kidwiz / claude-supercode-skills-penetration-tester exact

Expert in ethical hacking, vulnerability assessment, and offensive security testing (Web/Network/Cloud).

notchrisgroves / ia-framework-monitor exact

Real-time monitoring dashboard - system metrics, process monitoring, and resource tracking

404kidwiz / agent-skills-backup-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

automindtechnologie-jpg / ultimate-skill-md-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

shishiv / gsd-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

halay08 / fullstack-agent-skills-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

shishiv / gsd-burp-suite-web-application-testing exact

This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for testing", "perform web vulnerability scanning", "test with Burp Repeater",...

404kidwiz / agent-skills-backup-burp-suite-web-application-testing exact

This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for testing", "perform web vulnerability scanning", "test with Burp Repeater",...

halay08 / fullstack-agent-skills-burp-suite-web-application-testing exact

This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for testing", "perform web vulnerability scanning", "test with Burp Repeater",...

front-depiction / claude-setup-effect-ai-tool exact

Define and implement AI tools using @effect/ai's Tool and Toolkit APIs. Use when building LLM integrations with type-safe tool definitions, parameter validation, and handler implementations....

halay08 / fullstack-agent-skills-llm-application-dev-ai-assistant exact

You are an AI assistant development expert specializing in creating intelligent conversational interfaces, chatbots, and AI-powered applications. Design comprehensive AI assistant solutions with natur

404kidwiz / agent-skills-backup-llm-application-dev-ai-assistant exact

You are an AI assistant development expert specializing in creating intelligent conversational interfaces, chatbots, and AI-powered applications. Design comprehensive AI assistant solutions with natur

rmyndharis / antigravity-skills-llm-application-dev-ai-assistant exact

You are an AI assistant development expert specializing in creating intelligent conversational interfaces, chatbots, and AI-powered applications. Design comprehensive AI assistant solutions with natur

shishiv / gsd-llm-application-dev-ai-assistant exact

You are an AI assistant development expert specializing in creating intelligent conversational interfaces, chatbots, and AI-powered applications. Design comprehensive AI assistant solutions with natur

DauQuangThanh / hanoi-rainbow-code-security-review exact

Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE), authentication/authorization flaws, injection attacks, cryptography issues, sensitive data...