security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Generates professional, structured cyber threat intelligence reports tailored for executive, operational, and tactical audiences.
Performs comprehensive Bluetooth Low Energy (BLE) security audits to identify vulnerabilities in IoT and wireless devices.
Conducts comprehensive Information Security Management System (ISMS) audits and manages ISO 27001 compliance workflows from gap analysis to certification support.
Conducts systematic audits of high-privilege accounts to enforce least privilege and ensure compliance with security frameworks.
Analyzes and bypasses Content Security Policy (CSP) implementations to identify vulnerabilities and test XSS mitigation effectiveness.
Detects and exploits blind Server-Side Request Forgery vulnerabilities using out-of-band techniques and cloud metadata analysis.
Detects Kerberos Golden Ticket forgery by identifying encryption downgrades and ticket anomalies within Windows Security Event logs.
Identifies and tests SMTP header injection vulnerabilities in web applications to prevent spam relay and phishing attacks.
Audits real-time WebSocket implementations for security flaws like authentication bypass, hijacking, and injection.
Identifies unauthorized credential usage by analyzing NTLM authentication patterns and correlating them with credential dumping activities.
Implements granular USB device control policies across endpoints to prevent data exfiltration and mitigate malware risks from unauthorized removable media.
Detects and analyzes heap spray attacks in memory dumps by identifying NOP sled patterns and suspicious memory allocations using Volatility3.
Identifies and tests for OAuth 2.0 and OpenID Connect vulnerabilities including redirect URI manipulation and token leakage.
Tests and identifies critical injection vulnerabilities in APIs, covering SQL, NoSQL, SSRF, and command injection vectors.
Performs deep packet inspection and forensic analysis of network traffic to identify security threats, data exfiltration, and malicious communications.
Streamlines the systematic process of identifying, testing, and deploying software updates to remediate vulnerabilities across IT infrastructure.
Detects and analyzes anomalous network connections to identify potential command-and-control activity and data exfiltration.
Implements comprehensive external attack surface management to discover, fingerprint, and score the risk of internet-facing assets.
Performs deep-inspection security assessments using system credentials to identify patches, configurations, and hidden vulnerabilities.
Performs automated GraphQL schema extraction and vulnerability assessments to secure API endpoints against common attack vectors.
Detects and analyzes ransomware activity within network logs by identifying C2 beaconing, TOR connections, and data exfiltration patterns.
Monitors and detects unauthorized container escape attempts in real-time using Falco runtime security rules and syscall analysis.
Secures serverless compute platforms by implementing least-privilege IAM roles, secrets management, dependency scanning, and runtime monitoring.
Automates the deployment and management of AWS Config rules to ensure continuous resource compliance with CIS and PCI DSS frameworks.
Secures your AI development environment by performing automated supply chain security scans on Claude Code skills before installation.
Analyzes and reports test coverage for Go projects to identify testing gaps and ensure software reliability.
Secures Temporal clusters using mTLS, role-based access control (RBAC), and network isolation policies.
Provides standardized implementation patterns and guidance for testing Temporal workflows, activities, and Nexus operations using the Go SDK.
Secures Temporal clusters through mTLS, role-based access control, and network policy implementations.
Standardizes the testing process for BayesFlow extensions by implementing best practices for Keras backends, shape verification, and simulation mocks.
Scroll for more results...