Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Generates comprehensive unit and integration tests using TDD principles and standardized patterns to ensure maximum code reliability.
Configures and tests essential network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing labs.
Conducts comprehensive security audits of SMTP servers to identify vulnerabilities like open relays, user enumeration, and weak authentication.
Performs comprehensive web application security audits by intercepting, analyzing, and modifying HTTP traffic using Burp Suite's professional toolset.
Conducts comprehensive penetration testing and vulnerability assessments using the Metasploit Framework.
Conducts systematic security audits to identify and mitigate Insecure Direct Object Reference (IDOR) vulnerabilities in web applications and APIs.
Conducts thorough security assessments and ethical hacking operations within Amazon Web Services environments.
Provides a structured methodology and comprehensive checklist for planning, executing, and remediating penetration tests.
Identifies and exploits security misconfigurations, kernel vulnerabilities, and system weaknesses to elevate user privileges on Linux systems.
Facilitates the identification and testing of privilege escalation paths on Linux and Windows systems for authorized security audits.
Automates SQL injection vulnerability detection and database exploitation using industry-standard SQLMap methodologies.
Conducts comprehensive security audits and vulnerability assessments using industry-standard scanning tools and methodologies.
Guides users through the complete penetration testing lifecycle with domain-specific techniques for authorized security assessments.
Conducts comprehensive security audits for authentication mechanisms and session management to identify vulnerabilities like credential stuffing and session fixation.
Provides systematic methodologies and commands for discovering and exploiting privilege escalation vulnerabilities on Windows systems.
Provides comprehensive methodologies and command workflows for assessing security vulnerabilities within Microsoft Active Directory environments.
Conducts comprehensive security audits and penetration tests across major cloud providers including AWS, Azure, and GCP.
Provides comprehensive techniques and automated workflows for identifying vulnerabilities in REST, GraphQL, and SOAP APIs.
Identifies and tests for directory traversal vulnerabilities to ensure secure filesystem access in web applications.
Leverages the Shodan search engine to identify exposed devices, vulnerable services, and IoT infrastructure during security assessments.
Conducts comprehensive SSH security assessments including enumeration, credential testing, and vulnerability exploitation.
Performs comprehensive SQL injection vulnerability assessments to identify security flaws and validate input sanitization in web applications.
Performs comprehensive security assessments and vulnerability scanning on WordPress installations to identify and mitigate risks.
Conducts comprehensive security audits to identify, exploit, and remediate client-side injection vulnerabilities in web applications.
Automates reconnaissance, vulnerability discovery, and security auditing using industry-standard red team methodologies.
Provides comprehensive definitions, root causes, and remediation strategies for the top 100 web application security flaws.
Provides an extensive reference library of penetration testing commands and workflows for security auditing and network scanning.
Conducts comprehensive security audits for HTML injection vulnerabilities to protect web applications from content manipulation and phishing attacks.
Analyzes network traffic, captures packets, and troubleshoots connectivity using advanced Wireshark filtering and protocol analysis techniques.
Generates comprehensive, requirement-driven test cases from PRD documents and user requirements to ensure complete software quality coverage.
Scroll for more results...