security & testing向けのClaudeスキルを発見してください。105個のスキルを閲覧し、AIワークフローに最適な機能を見つけましょう。
Conducts comprehensive security audits and vulnerability assessments of WordPress installations using professional penetration testing methodologies.
Automates the execution and analysis of integration tests to validate component interactions and system stability.
Identifies security vulnerabilities, sensitive data leaks, and insecure implementation patterns in React Native applications across both JavaScript and native code layers.
Conducts comprehensive security audits and penetration tests across major cloud platforms including AWS, Azure, and GCP.
Conducts comprehensive security assessments and penetration tests across AWS, Azure, and Google Cloud Platform environments.
Evaluates and benchmarks LLM agents using behavioral testing, reliability metrics, and production monitoring to ensure consistent performance in real-world scenarios.
Enforces a rigorous evidence-based protocol that requires fresh command output before any task is claimed as finished or fixed.
Guides users through the complete penetration testing lifecycle from initial reconnaissance to professional security reporting.
Provides actionable techniques and command-line references for escalating user privileges on Linux and Windows systems.
Verifies system behavioral equivalence through formal coalgebraic observation and final bisimulation analysis.
Conducts comprehensive security assessments and vulnerability discovery for REST, SOAP, and GraphQL APIs.
Provides a comprehensive guide to identifying, understanding, and mitigating the most critical web application security flaws.
Provides a comprehensive, structured guide to identifying, understanding, and mitigating the top 100 web application vulnerabilities.
Evaluates and benchmarks LLM agents using behavioral testing, reliability metrics, and adversarial assessments to ensure production readiness.
Conducts comprehensive security reconnaissance and vulnerability discovery using Shodan's search engine, CLI, and API.
Provides comprehensive techniques and commands for escalating user privileges on compromised Linux and Windows systems.
Provides a comprehensive framework for the full penetration testing lifecycle, including reconnaissance, scanning, exploitation, and professional reporting.
Conducts automated network reconnaissance and vulnerability discovery using the Shodan search engine, CLI, and REST API.
Conducts comprehensive security assessments and fuzzing on REST, SOAP, and GraphQL APIs to identify vulnerabilities like IDOR, SQL injection, and authentication bypasses.
Identifies and exploits Linux system misconfigurations to elevate user privileges to root-level access.
Conducts comprehensive security audits and vulnerability assessments using industry-standard tools for networks, web apps, and cloud infrastructure.
Enforces rigorous evidence-based verification before any code task is marked as complete or committed.
Conducts systematic security assessments to identify and exploit privilege escalation vectors on Linux systems.
Conducts comprehensive security assessments and penetration testing across Amazon Web Services environments to identify vulnerabilities and privilege escalation paths.
Identifies and exploits Cross-Site Scripting (XSS) and HTML injection vulnerabilities using advanced detection and bypass techniques.
Provides a comprehensive command library for penetration testing tools including Nmap, Metasploit, and SQLMap.
Performs comprehensive security assessments to detect, exploit, and remediate Cross-Site Scripting (XSS) and HTML injection vulnerabilities in web applications.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws in web applications.
Implements structured adversary simulation principles and security audit workflows based on the MITRE ATT&CK framework.
Conducts end-to-end SSH security audits, from initial service discovery and credential testing to advanced tunneling and post-exploitation analysis.
Scroll for more results...