1121 results (27.1ms) page 6 / 57
ngxtm / devkit-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

cleodin / antigravity-awesome-skills-pentest-checklist exact

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...

rand / cc-polymath-discover-research exact

Gateway skill for research methodology - automatically loads relevant research skills based on task context

cleodin / antigravity-awesome-skills-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

halay08 / fullstack-agent-skills-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

zebbern / claude-code-guide-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

sickn33 / antigravity-awesome-skills-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

automindtechnologie-jpg / ultimate-skill-md-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

ngxtm / devkit-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

404kidwiz / agent-skills-backup-security-scanning-tools exact

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...

ncklrs / startup-os-skills-sales-strategist exact

Expert sales strategy and operations guidance for B2B SaaS companies. Use when designing sales processes, implementing qualification frameworks (MEDDIC, BANT, SPICED), territory planning,...

wondelai / skills-scorecard-marketing exact

Lead generation system using quiz/assessment funnels (Scorecard Marketing). Use when creating landing pages for lead generation, quiz funnels, online assessments, questionnaires that qualify...

oaustegard / claude-skills-updating-knowledge exact

Systematic research methodology for building comprehensive, current knowledge on any topic. Requires web_search tool. Use when questions require thorough investigation, recent developments...

arielperez82 / agents-and-skills-updating-knowledge exact

Systematic research methodology for building comprehensive, current knowledge on any topic. Requires web_search tool. Use when questions require thorough investigation, recent developments...

daymade / claude-code-skills-prompt-optimizer exact

Transform vague prompts into precise, well-structured specifications using EARS (Easy Approach to Requirements Syntax) methodology. This skill should be used when users provide loose requirements,...

proffesor-for-testing / agentic-qe-six-thinking-hats exact

Apply Edward de Bono's Six Thinking Hats methodology to software testing for comprehensive quality analysis. Use when designing test strategies, conducting test retrospectives, analyzing test...

cosmix / loom-threat-model exact

Threat modeling methodologies (STRIDE, DREAD, PASTA, attack trees) for secure architecture design. Use when planning new systems, reviewing architecture security, identifying threats, or assessing...

samhvw8 / dot-claude-sequential-thinking exact

Structured reflective problem-solving methodology. Process: decompose, analyze, hypothesize, verify, revise. Capabilities: complex problem decomposition, adaptive planning, course correction,...

404kidwiz / agent-skills-backup-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.

halay08 / fullstack-agent-skills-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.