1272 results (12.4ms) page 5 / 64
BrownFineSecurity / iothackbot-telnetshell exact

Use telnet to interact with IoT device shells for pentesting operations including device enumeration, vulnerability discovery, credential testing, and post-exploitation. Use when the user needs to...

browserwing / browserwing exact

Control browser automation through HTTP API. Supports page navigation, element interaction (click, type, select), data extraction, accessibility snapshot analysis, screenshot, JavaScript...

halay08 / fullstack-agent-skills-shodan-reconnaissance-and-pentesting exact

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with...

ngxtm / devkit-shodan-reconnaissance-and-pentesting exact

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with...

zebbern / claude-code-guide-shodan-reconnaissance-and-pentesting exact

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with...

sickn33 / antigravity-awesome-skills-shodan-reconnaissance-and-pentesting exact

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with...

cleodin / antigravity-awesome-skills-shodan-reconnaissance-and-pentesting exact

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with...

404kidwiz / agent-skills-backup-shodan-reconnaissance-and-pentesting exact

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with...

db 0.00
johnlindquist / claude-db exact

Database operations for SQLite, PostgreSQL, and MySQL. Use for queries, schema inspection, migrations, and AI-assisted query generation.

nctiggy / claude-skills-spectrocloud-agent-mode exact

Deploy and manage Spectro Cloud Palette Edge clusters using Agent Mode. Covers installation, registration tokens, node validation, cluster profiles with BYOOS pack, and uninstallation procedures.

gookit / skills-gookit-config exact

Simple, full-featured Go application configuration management

nctiggy / claude-skills-spectrocloud-clusters exact

Create and manage Spectro Cloud Palette Edge clusters. Covers edge-native deployments including agent mode, appliance mode, and 2-node HA. Both API and Terraform.

tlon 0.00
tloncorp / tlon-skill exact

Interact with Tlon/Urbit beyond the channel plugin. Use for contacts (get/update profiles, nicknames, avatars), listing channels/groups, fetching message history, posting to channels, sending DMs,...

cleodin / antigravity-awesome-skills-red-team-tools-and-methodology exact

This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...

halay08 / fullstack-agent-skills-red-team-tools-and-methodology exact

This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...

404kidwiz / agent-skills-backup-red-team-tools-and-methodology exact

This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...

zebbern / claude-code-guide-red-team-tools-and-methodology exact

This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or...