143 results (4.2ms) page 4 / 8
dirnbauer / webconsulting-skills-security-audit exact

Security audit patterns for PHP/OWASP. Use when conducting security assessments, identifying vulnerabilities (XXE, SQL injection, XSS), or CVSS scoring.

ngxtm / devkit-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

zebbern / claude-code-guide-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

cleodin / antigravity-awesome-skills-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

automindtechnologie-jpg / ultimate-skill-md-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

404kidwiz / agent-skills-backup-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

sickn33 / antigravity-awesome-skills-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

halay08 / fullstack-agent-skills-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

aj-geddes / useful-ai-prompts-network-security-groups exact

Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.

williamzujkowski / cognitive-toolworks-database-schema-designer exact

Design normalized database schemas with ERDs, migration plans, and indexing strategies for relational and document databases

ovachiever / droid-tings-information-security-manager-iso27001 exact

Senior Information Security Manager specializing in ISO 27001 and ISO 27002 implementation for HealthTech and MedTech companies. Provides ISMS implementation, cybersecurity risk assessment,...

williamzujkowski / cognitive-toolworks-frontend-performance-optimizer exact

Analyzes and optimizes frontend performance using Core Web Vitals, bundle analysis, lazy loading, image optimization, and caching strategies