security & testing向けのClaudeスキルを発見してください。105個のスキルを閲覧し、AIワークフローに最適な機能を見つけましょう。
Guides the systematic detection, exploitation, and remediation of Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Conducts comprehensive security audits to identify and remediate directory traversal and Local File Inclusion (LFI) vulnerabilities.
Guides users through the full lifecycle of penetration testing, from scope definition and environment preparation to monitoring and remediation.
Enforces a strict Red-Green-Refactor workflow to ensure high-quality, bug-free production code through disciplined testing.
Analyzes and troubleshoots network traffic using Wireshark to capture packets, filter data, and investigate security anomalies.
Performs comprehensive network packet capture, filtering, and protocol analysis to troubleshoot connectivity and investigate security incidents.
Conducts advanced security audits and vulnerability assessments using OWASP 2025 standards and modern threat modeling.
Transforms entire codebases into enterprise-grade, production-ready software by automatically fixing security vulnerabilities, performance bottlenecks, and architectural flaws.
Identifies and exploits directory traversal and local file inclusion (LFI) vulnerabilities through comprehensive testing methodologies and bypass techniques.
Performs deep packet inspection and network protocol analysis using Wireshark for security auditing, troubleshooting, and performance optimization.
Provides systematic methodologies for detecting, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Provides systematic methodologies and commands for discovering and exploiting privilege escalation vulnerabilities on Windows systems.
Enforces a strict evidence-first workflow by requiring fresh verification evidence before any completion claims are made.
Transforms codebases into enterprise-grade, production-ready software through autonomous deep-scanning and systematic optimization.
Systematically identifies and resolves failing tests through intelligent error grouping and prioritized root cause analysis.
Enforces strict Red-Green-Refactor cycles to ensure every line of production code is verified by a failing test first.
Integrates Supabase Authentication with Next.js App Router using best practices for server-side rendering and secure session management.
Autonomously scans and transforms codebases into enterprise-grade, production-ready software with automated security and performance fixes.
Identifies, exploits, and remediates directory traversal and Local File Inclusion (LFI) vulnerabilities using structured testing methodologies.
Integrates Supabase Authentication into Next.js App Router applications using industry-standard patterns and server-side security.
Provides a structured methodology and comprehensive checklists for planning, executing, and remediating security penetration tests.
Performs comprehensive security audits and penetration testing on Microsoft Active Directory environments to identify and mitigate vulnerabilities.
Provides a comprehensive suite of techniques and command references for auditing and testing Microsoft Active Directory environments.
Conducts comprehensive security audits to identify and remediate Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Enforces strict Red-Green-Refactor workflows to ensure high-quality, verified production code through a test-first approach.
Provides comprehensive guidance for evaluating and securing Microsoft Active Directory environments through authorized penetration testing techniques.
Performs comprehensive security assessments of WordPress installations through automated enumeration, vulnerability scanning, and exploitation workflows.
Streamlines penetration testing workflows by providing expert guidance on vulnerability exploitation, payload generation, and post-exploitation using the Metasploit Framework.
Automates and guides penetration testing workflows using the Metasploit Framework for vulnerability research and exploitation.
Performs comprehensive security audits and vulnerability assessments of WordPress installations using professional penetration testing methodologies.
Scroll for more results...