security & testing向けのClaudeスキルを発見してください。105個のスキルを閲覧し、AIワークフローに最適な機能を見つけましょう。
Enforces a rigorous Test-Driven Development (TDD) lifecycle for C++20 projects using Google Test, CMake, and coverage analysis.
Streamlines the creation and troubleshooting of unit and integration tests for JUDO applications using the Guice-based testkit.
Implements and manages comprehensive OAuth2 and OpenID Connect authentication pipelines within the JUDO Runtime Core.
Identifies and tests for HTML injection vulnerabilities to secure web applications against content manipulation and phishing attacks.
Provides a structured methodology and comprehensive checklists for planning, executing, and remediating penetration testing engagements.
Performs advanced security audits and vulnerability analysis using modern threat landscape principles and OWASP 2025 standards.
Provides systematic methodologies and command-line techniques for discovering and exploiting privilege escalation vulnerabilities on Windows systems.
Conducts advanced security audits and vulnerability scans using OWASP 2025 principles and supply chain analysis.
Conducts comprehensive security assessments and vulnerability testing for SMTP mail servers.
Guides the systematic detection, exploitation, and remediation of Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Conducts comprehensive security audits to identify and remediate directory traversal and Local File Inclusion (LFI) vulnerabilities.
Guides users through the full lifecycle of penetration testing, from scope definition and environment preparation to monitoring and remediation.
Enforces a strict Red-Green-Refactor workflow to ensure high-quality, bug-free production code through disciplined testing.
Analyzes and troubleshoots network traffic using Wireshark to capture packets, filter data, and investigate security anomalies.
Performs comprehensive network packet capture, filtering, and protocol analysis to troubleshoot connectivity and investigate security incidents.
Conducts advanced security audits and vulnerability assessments using OWASP 2025 standards and modern threat modeling.
Transforms entire codebases into enterprise-grade, production-ready software by automatically fixing security vulnerabilities, performance bottlenecks, and architectural flaws.
Identifies and exploits directory traversal and local file inclusion (LFI) vulnerabilities through comprehensive testing methodologies and bypass techniques.
Performs deep packet inspection and network protocol analysis using Wireshark for security auditing, troubleshooting, and performance optimization.
Provides systematic methodologies for detecting, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Provides systematic methodologies and commands for discovering and exploiting privilege escalation vulnerabilities on Windows systems.
Transforms codebases into enterprise-grade, production-ready software through autonomous deep-scanning and systematic optimization.
Systematically identifies and resolves failing tests through intelligent error grouping and prioritized root cause analysis.
Enforces strict Red-Green-Refactor cycles to ensure every line of production code is verified by a failing test first.
Integrates Supabase Authentication with Next.js App Router using best practices for server-side rendering and secure session management.
Autonomously scans and transforms codebases into enterprise-grade, production-ready software with automated security and performance fixes.
Identifies, exploits, and remediates directory traversal and Local File Inclusion (LFI) vulnerabilities using structured testing methodologies.
Integrates Supabase Authentication into Next.js App Router applications using industry-standard patterns and server-side security.
Provides a structured methodology and comprehensive checklists for planning, executing, and remediating security penetration tests.
Performs comprehensive security audits and penetration testing on Microsoft Active Directory environments to identify and mitigate vulnerabilities.
Scroll for more results...