security & testing Claude 스킬을 발견하세요. 105개의 스킬을 탐색하고 AI 워크플로우에 완벽한 기능을 찾아보세요.
Generates mocks, stubs, spies, and fakes to isolate dependencies and streamline automated testing workflows.
Validates software changes through automated test execution, acceptance criteria verification, and regression detection to ensure high-quality code delivery.
Audits Python projects against modern standards for configuration, security, and project structure to ensure code quality.
Enforces a rigorous Red-Green-Refactor Test-Driven Development cycle for AI-assisted coding tasks.
Performs comprehensive security assessments and penetration testing on Amazon Web Services infrastructure to identify vulnerabilities and privilege escalation paths.
Automates local web application testing and interaction using native Python Playwright scripts and managed server lifecycles.
Implements a rigorous four-phase protocol to identify root causes and eliminate guess-and-check bug fixing.
Provides comprehensive guidance and command syntax for identifying and exploiting privilege escalation vulnerabilities during authorized security assessments.
Enforces a strict evidence-first protocol that requires running verification commands before claiming any task is complete or passing.
Provides a comprehensive catalog of 100 critical web application vulnerabilities with detailed root causes, impacts, and remediation strategies.
Conducts comprehensive security assessments and ethical hacking across AWS, Azure, and Google Cloud environments.
Guides users through the complete penetration testing lifecycle using industry-standard tools and ethical frameworks.
Executes systematic assessments to identify and exploit security misconfigurations for elevating Linux user privileges to root-level control.
Provides comprehensive command patterns and methodologies for industry-standard network discovery and vulnerability assessment tools.
Conducts comprehensive security assessments and fuzzing on REST, GraphQL, and SOAP APIs to identify vulnerabilities like IDOR, injection, and authentication bypasses.
Implements a rigorous four-phase methodology to identify root causes and resolve technical issues without trial-and-error thrashing.
Performs comprehensive web application security audits by intercepting HTTP traffic, modifying requests, and identifying vulnerabilities using Burp Suite.
Conducts comprehensive web application security testing using Burp Suite for traffic interception, manual exploitation, and automated vulnerability scanning.
Implements industry-standard security patterns for REST, GraphQL, and WebSocket APIs to prevent common vulnerabilities and data leaks.
Configures and tests network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing environments.
Enforces a rigorous four-phase protocol to identify root causes and implement verified fixes for complex software bugs.
Implements robust Jest testing patterns, factory functions, and TDD workflows to ensure high-quality, maintainable codebases.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws in web applications.
Automates and guides security vulnerability assessments, network discovery, and compliance auditing using industry-standard tools.
Provides a comprehensive command library for penetration testing tools including Nmap, Metasploit, and SQLMap.
Conducts comprehensive SSH security assessments including enumeration, credential attacks, and vulnerability exploitation for hardened network environments.
Performs comprehensive security assessments to detect, exploit, and remediate Cross-Site Scripting (XSS) and HTML injection vulnerabilities in web applications.
Identifies and exploits Cross-Site Scripting (XSS) and HTML injection vulnerabilities using advanced detection and bypass techniques.
Conducts comprehensive security audits and vulnerability assessments using industry-standard tools for networks, web apps, and cloud infrastructure.
Conducts comprehensive security assessments and fuzzing on REST, SOAP, and GraphQL APIs to identify vulnerabilities like IDOR, SQL injection, and authentication bypasses.
Scroll for more results...