security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Conducts comprehensive security audits, vulnerability scans, and network assessments using industry-standard tools and methodologies.
Transforms entire codebases into enterprise-grade, production-ready systems through autonomous deep-scanning and automated refactoring.
Conducts professional web application security testing and vulnerability assessment using Burp Suite's integrated toolset.
Executes comprehensive web application security testing and vulnerability scanning using Burp Suite's integrated toolset.
Analyzes network traffic using Wireshark to capture, filter, and troubleshoot network protocols and security anomalies.
Conducts advanced security audits and vulnerability scans based on 2025 threat landscapes and OWASP standards.
Audits Python research code for data leaks, PII exposure, and license compliance risks.
Implements robust security patterns for APIs, including authentication, authorization, input validation, and protection against common vulnerabilities.
Guides users through the complete penetration testing lifecycle with domain-specific techniques and security best practices.
Performs advanced reconnaissance and vulnerability discovery for internet-exposed devices using the Shodan search engine.
Secures backend services by implementing robust authentication, authorization, input validation, and rate-limiting patterns.
Performs systematic privilege escalation assessments on Linux systems to identify and exploit security misconfigurations for root-level access.
Guides users through the complete penetration testing lifecycle, from reconnaissance and vulnerability scanning to exploitation and professional reporting.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws.
Implements a rigorous, four-phase methodology to identify and resolve root causes of software defects rather than patching symptoms.
Executes comprehensive SQL injection vulnerability assessments to identify database flaws and validate input sanitization.
Leverages the Shodan search engine to discover exposed internet-connected devices, open ports, and vulnerable services for security auditing.
Conducts systematic privilege escalation assessments on Linux systems to identify and exploit security misconfigurations and vulnerabilities.
Conducts deep, systematic audits of codebases to identify bugs, race conditions, and architectural flaws before production deployment.
Conducts advanced security audits and risk assessments based on OWASP 2025 standards and modern threat landscapes.
Automates and tests local web applications using Playwright with integrated server lifecycle management.
Conducts comprehensive security audits and penetration tests on Amazon Web Services environments to identify vulnerabilities and privilege escalation paths.
Performs comprehensive security assessments and penetration testing across AWS environments to identify vulnerabilities and privilege escalation paths.
Systematically identifies, groups, and resolves failing test suites using smart error analysis and prioritized fixing strategies.
Guides and automates the use of the Metasploit Framework for comprehensive security assessments, vulnerability exploitation, and post-exploitation tasks.
Automates local web application testing and UI verification using Playwright scripts and integrated server management.
Implements secure, production-ready authentication workflows using Supabase Auth and the Next.js App Router.
Mandates empirical evidence and command execution before any code task is marked as complete or fixed.
Ensures code quality and syntax correctness through automated linting, type checking, and security audits across multiple programming ecosystems.
Conducts comprehensive security audits and vulnerability assessments for WordPress installations using industry-standard tools and methodologies.
Scroll for more results...