security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Conducts automated network reconnaissance and vulnerability discovery using the Shodan search engine, CLI, and REST API.
Enforces a rigorous, self-skeptical development mindset focused on technical accuracy and red-teaming assumptions.
Conducts comprehensive security assessments and fuzzing on REST, SOAP, and GraphQL APIs to identify vulnerabilities like IDOR, SQL injection, and authentication bypasses.
Identifies and exploits Linux system misconfigurations to elevate user privileges to root-level access.
Identifies and bypasses anti-debugging, obfuscation, and software protection mechanisms during authorized security analysis and malware research.
Conducts comprehensive security audits and vulnerability assessments using industry-standard tools for networks, web apps, and cloud infrastructure.
Enforces rigorous evidence-based verification before any code task is marked as complete or committed.
Conducts systematic security assessments to identify and exploit privilege escalation vectors on Linux systems.
Conducts comprehensive security assessments and penetration testing across Amazon Web Services environments to identify vulnerabilities and privilege escalation paths.
Automates the creation of Java-based database integration tests for infrastructure layers using Maven Failsafe.
Identifies and exploits Cross-Site Scripting (XSS) and HTML injection vulnerabilities using advanced detection and bypass techniques.
Provides a comprehensive command library for penetration testing tools including Nmap, Metasploit, and SQLMap.
Performs comprehensive security assessments to detect, exploit, and remediate Cross-Site Scripting (XSS) and HTML injection vulnerabilities in web applications.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws in web applications.
Implements structured adversary simulation principles and security audit workflows based on the MITRE ATT&CK framework.
Conducts end-to-end SSH security audits, from initial service discovery and credential testing to advanced tunneling and post-exploitation analysis.
Automates and tests local web applications using Playwright to verify functionality, debug UI behavior, and capture browser logs.
Implements proactive safety measures and emergency fail-safes to mitigate high-risk system failures.
Implements a rigorous Test-Driven Development cycle to ensure code quality and reliability through the Red-Green-Refactor pattern.
Systematically identifies potential failure modes and prioritizes preventive actions using quantitative Risk Priority Numbers (RPN).
Performs automated security audits and PR reviews using advanced detection heuristics for vulnerabilities like SQLi, XSS, and hardcoded secrets.
Enforces a rigorous four-phase protocol to identify root causes and implement verified fixes for complex software bugs.
Guides adversary simulation and security posture validation using the MITRE ATT&CK framework.
Configures and tests network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing environments.
Conducts comprehensive SSH security assessments including enumeration, credential attacks, and vulnerability exploitation for hardened network environments.
Implements standardized Jest testing patterns, factory functions, and TDD workflows for maintainable React and React Native applications.
Automates and guides security vulnerability assessments, network discovery, and compliance auditing using industry-standard tools.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws.
Implements robust Jest testing patterns, factory functions, and TDD workflows to ensure high-quality, maintainable codebases.
Automates the writing, execution, and analysis of unit, integration, and end-to-end tests for modern SaaS applications.
Scroll for more results...