Descubre Habilidades de Claude para security & testing. Explora 92 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Implements programmatic terminal interfaces to control interactive shell sessions and automate command-line program interactions.
Identifies and replaces sensitive credentials, API keys, and tokens within git repositories to ensure secure codebase sharing and auditing.
Identifies, analyzes, and patches security flaws and CWE-classified vulnerabilities using a systematic workflow and thorough test-driven verification.
Removes JavaScript and XSS attack vectors from HTML documents while maintaining the original file formatting and structure.
Implements robust Python asyncio task cancellation and signal handling patterns to ensure graceful shutdowns and proper resource cleanup.
Translates legacy COBOL programs into modern programming languages while ensuring functional equivalence and byte-level output compatibility.
Extracts and reconstructs text geometrically encoded within 3D printing or CNC toolpaths by analyzing movement coordinates and extrusion patterns.
Implements PCI DSS standards and secure payment card data handling practices to protect sensitive financial information.
Configures and troubleshoots C/C++ projects with gcov instrumentation to ensure accurate code coverage data generation and analysis.
Generates and verifies self-signed SSL/TLS certificates, private keys, and combined PEM files using OpenSSL command-line tools.
Guides the implementation of differential cryptanalysis attacks to recover round keys from FEAL and similar Feistel-network block ciphers.
Implements robust Python asyncio task cancellation and signal handling for graceful application shutdown and resource cleanup.
Provides mathematical and procedural guidance for performing linear cryptanalysis attacks on the FEAL cipher family to recover encryption keys.
Generates source code that compiles and executes correctly as both Rust and C or C++ by utilizing comment syntax differences and preprocessor directives.
Guides the construction of induction proofs in the Coq proof assistant for mathematical properties like addition commutativity and arithmetic lemmas.
Implements rigorous differential cryptanalysis attacks to recover keys from FEAL and similar weak Feistel block ciphers.
Extracts passwords and sensitive information from disk images, deleted files, and binary fragments using systematic digital forensic techniques.
Provides a systematic methodology for identifying and bypassing HTML/JavaScript sanitization filters in security testing environments.
Diagnoses and resolves memory management issues, pointer arithmetic bugs, and runtime corruption within the OCaml garbage collector.
Recovers sensitive data from Git history and ensures thorough cleanup of leaked secrets through deep object-store analysis.
Sanitizes HTML documents by removing JavaScript injection vectors and executable content while strictly preserving original formatting and structure.
Extracts memory values and structured data from Executable and Linkable Format (ELF) binary files across various architectures and endianness types.
Provides a systematic methodology for bypassing HTML sanitizers and crafting cross-site scripting (XSS) payloads in authorized security testing environments.
Extracts and cracks password hashes from encrypted 7z archives using industry-standard tools and methodologies.
Implements robust security patterns and vulnerability prevention techniques for Solidity smart contracts.
Prevents common software testing pitfalls like over-mocking, production code pollution, and incomplete test data structures.
Performs linear cryptanalysis on FEAL and similar Feistel ciphers to recover encryption keys using statistical linear approximations and bias analysis.
Diagnoses and resolves complex memory corruption and crashes in custom heap implementations, focusing on release-only failures and static destruction order issues.
Debugs complex memory crashes in C++ applications related to custom allocators, static destruction ordering, and discrepancies between build configurations.
Enforces a rigorous Red-Green-Refactor cycle to ensure every line of production code is verified by a failing test first.
Scroll for more results...