1895 results (16.6ms) page 30 / 95
aj-geddes / useful-ai-prompts-multi-cloud-strategy exact

Design and implement multi-cloud strategies spanning AWS, Azure, and GCP with vendor lock-in avoidance, hybrid deployments, and federation.

loki 0.00
julianobarbosa / claude-code-skills-loki exact

Guide for implementing Grafana Loki - a horizontally scalable, highly available log aggregation system. Use when configuring Loki deployments, setting up storage backends (S3, Azure Blob, GCS),...

silvainfm / claude-skills-streamlit exact

Fast Python framework for building interactive web apps, dashboards, and data visualizations without HTML/CSS/JavaScript. Use when user wants to create data apps, ML demos, dashboards, data...

aj-geddes / useful-ai-prompts-secrets-rotation exact

Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing secrets lifecycle, compliance requirements, or security hardening.

AsyrafHussin / agent-skills-git-workflow exact

Git best practices, branching strategies, commit conventions, and PR workflows. Use when reviewing git history, writing commits, setting up branching strategy, or improving git practices. Triggers...

onewave-ai / claude-skills-linkedin-sales-navigator-alt exact

Build targeted prospect lists by analyzing LinkedIn profiles, extracting job titles, companies, locations, and recent activity. Identifies decision-makers, tracks job changes for warm outreach,...

pqem / agent-automatizado-resonant-coding exact

Metodología completa de Resonant Coding - Regla de los 5, baldes limpios, tres expertos

ngxtm / devkit-shodan-reconnaissance-and-pentesting exact

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with...

sickn33 / antigravity-awesome-skills-shodan-reconnaissance-and-pentesting exact

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with...