security & testing向けのClaudeスキルを発見してください。105個のスキルを閲覧し、AIワークフローに最適な機能を見つけましょう。
Provides a comprehensive guide to identifying, understanding, and mitigating the most critical web application security flaws.
Provides a comprehensive, structured guide to identifying, understanding, and mitigating the top 100 web application vulnerabilities.
Evaluates and benchmarks LLM agents using behavioral testing, reliability metrics, and adversarial assessments to ensure production readiness.
Conducts comprehensive security reconnaissance and vulnerability discovery using Shodan's search engine, CLI, and API.
Provides comprehensive techniques and commands for escalating user privileges on compromised Linux and Windows systems.
Provides a comprehensive framework for the full penetration testing lifecycle, including reconnaissance, scanning, exploitation, and professional reporting.
Conducts automated network reconnaissance and vulnerability discovery using the Shodan search engine, CLI, and REST API.
Conducts comprehensive security assessments and fuzzing on REST, SOAP, and GraphQL APIs to identify vulnerabilities like IDOR, SQL injection, and authentication bypasses.
Identifies and exploits Linux system misconfigurations to elevate user privileges to root-level access.
Conducts comprehensive security audits and vulnerability assessments using industry-standard tools for networks, web apps, and cloud infrastructure.
Enforces rigorous evidence-based verification before any code task is marked as complete or committed.
Conducts systematic security assessments to identify and exploit privilege escalation vectors on Linux systems.
Conducts comprehensive security assessments and penetration testing across Amazon Web Services environments to identify vulnerabilities and privilege escalation paths.
Identifies and exploits Cross-Site Scripting (XSS) and HTML injection vulnerabilities using advanced detection and bypass techniques.
Provides a comprehensive command library for penetration testing tools including Nmap, Metasploit, and SQLMap.
Performs comprehensive security assessments to detect, exploit, and remediate Cross-Site Scripting (XSS) and HTML injection vulnerabilities in web applications.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws in web applications.
Implements structured adversary simulation principles and security audit workflows based on the MITRE ATT&CK framework.
Conducts end-to-end SSH security audits, from initial service discovery and credential testing to advanced tunneling and post-exploitation analysis.
Automates and tests local web applications using Playwright to verify functionality, debug UI behavior, and capture browser logs.
Enforces a rigorous four-phase protocol to identify root causes and implement verified fixes for complex software bugs.
Guides adversary simulation and security posture validation using the MITRE ATT&CK framework.
Configures and tests network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing environments.
Conducts comprehensive SSH security assessments including enumeration, credential attacks, and vulnerability exploitation for hardened network environments.
Implements standardized Jest testing patterns, factory functions, and TDD workflows for maintainable React and React Native applications.
Automates and guides security vulnerability assessments, network discovery, and compliance auditing using industry-standard tools.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws.
Implements robust Jest testing patterns, factory functions, and TDD workflows to ensure high-quality, maintainable codebases.
Conducts comprehensive web application security testing using Burp Suite for traffic interception, manual exploitation, and automated vulnerability scanning.
Provides a comprehensive reference of essential commands for penetration testing tools, including Nmap, Metasploit, and SQLMap.
Scroll for more results...