security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Generates and executes xUnit tests for C# projects with integrated support for FluentAssertions and Moq.
Guides users through a comprehensive, multi-phase methodology for planning, executing, and remediating professional penetration tests.
Provides systematic methodologies and commands for discovering and exploiting privilege escalation vulnerabilities on Windows systems during security audits.
Performs comprehensive security audits to identify, exploit, and mitigate file path traversal and Local File Inclusion (LFI) vulnerabilities.
Provides systematic methodologies and commands for discovering and exploiting privilege escalation vulnerabilities on Windows systems during security assessments.
Performs comprehensive security audits and vulnerability assessments on SMTP mail servers to identify misconfigurations and exposure risks.
Configures and tests essential network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing labs.
Enforces a strict evidence-first protocol by requiring verified command outputs before any claims of task completion or success.
Automates professional reconnaissance and vulnerability discovery workflows using industry-standard red teaming tools and methodologies.
Conducts comprehensive security audits to identify, exploit, and remediate Cross-Site Scripting and HTML injection vulnerabilities in web applications.
Implements secure Clerk authentication patterns for Next.js applications, including middleware protection and server-side session management.
Enforces a strict Red-Green-Refactor workflow to ensure all production code is verified by failing tests before implementation.
Conducts comprehensive security audits and penetration tests across AWS, Azure, and Google Cloud Platform to identify and remediate vulnerabilities.
Automates and guides API security assessments to identify vulnerabilities like IDOR, injection, and authentication bypasses in REST, SOAP, and GraphQL interfaces.
Provides a comprehensive reference for penetration testing commands across network scanning, exploitation, and vulnerability assessment tools.
Configures and tests network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing environments.
Provides comprehensive, step-by-step techniques and commands for escalating privileges on Windows and Linux systems during penetration testing.
Provides expert techniques and commands for escalating user privileges on compromised Linux and Windows systems.
Provides a comprehensive, structured catalog of the top 100 web application vulnerabilities with root causes and remediation strategies.
Conducts comprehensive security assessments to identify and demonstrate cross-site scripting and HTML injection vulnerabilities in web applications.
Conducts comprehensive security audits and penetration tests across AWS, Azure, and Google Cloud Platform environments.
Audits code for vulnerabilities and enforces security best practices across authentication, data handling, and API development.
Provides comprehensive methodologies and commands for elevating user privileges on Linux and Windows systems during security assessments.
Automates SQL injection detection and database exploitation using SQLMap's comprehensive security testing methodologies.
Performs comprehensive security assessments to identify, exploit, and remediate Cross-Site Scripting (XSS) and HTML injection vulnerabilities in web applications.
Streamlines security reconnaissance and vulnerability discovery using proven red teaming methodologies and industry-standard tools.
Automates the detection and exploitation of SQL injection vulnerabilities to identify and secure database-driven web applications.
Audits code for vulnerabilities and implements industry-standard protection patterns for authentication, data handling, and API security.
Automates SQL injection vulnerability detection and database exploitation using the industry-standard SQLMap penetration testing framework.
Conducts comprehensive security audits and implements defensive coding patterns to protect applications from common vulnerabilities.
Scroll for more results...