Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Conducts comprehensive security assessments and fuzzing on REST, GraphQL, and SOAP APIs to identify vulnerabilities like IDOR, injection, and authentication bypasses.
Implements a rigorous four-phase methodology to identify root causes and resolve technical issues without trial-and-error thrashing.
Performs comprehensive web application security audits by intercepting HTTP traffic, modifying requests, and identifying vulnerabilities using Burp Suite.
Conducts comprehensive web application security testing using Burp Suite for traffic interception, manual exploitation, and automated vulnerability scanning.
Implements industry-standard security patterns for REST, GraphQL, and WebSocket APIs to prevent common vulnerabilities and data leaks.
Configures and tests network services like HTTP, HTTPS, SNMP, and SMB for security research and penetration testing environments.
Enforces a rigorous four-phase protocol to identify root causes and implement verified fixes for complex software bugs.
Implements robust Jest testing patterns, factory functions, and TDD workflows to ensure high-quality, maintainable codebases.
Performs comprehensive SQL injection vulnerability assessments to identify, exploit, and remediate database security flaws in web applications.
Automates and guides security vulnerability assessments, network discovery, and compliance auditing using industry-standard tools.
Provides a comprehensive command library for penetration testing tools including Nmap, Metasploit, and SQLMap.
Conducts comprehensive SSH security assessments including enumeration, credential attacks, and vulnerability exploitation for hardened network environments.
Performs comprehensive security assessments to detect, exploit, and remediate Cross-Site Scripting (XSS) and HTML injection vulnerabilities in web applications.
Identifies and exploits Cross-Site Scripting (XSS) and HTML injection vulnerabilities using advanced detection and bypass techniques.
Conducts comprehensive security audits and vulnerability assessments using industry-standard tools for networks, web apps, and cloud infrastructure.
Conducts comprehensive security assessments and fuzzing on REST, SOAP, and GraphQL APIs to identify vulnerabilities like IDOR, SQL injection, and authentication bypasses.
Provides comprehensive techniques and commands for escalating user privileges on compromised Linux and Windows systems.
Provides a comprehensive framework for the full penetration testing lifecycle, including reconnaissance, scanning, exploitation, and professional reporting.
Automates end-to-end web application testing using Playwright with integrated server lifecycle management.
Implements robust end-to-end testing suites using Playwright with a focus on maintainability and reliability.
Standardizes and automates the creation of robust test suites for BayesFlow extension packages using Pytest and Keras 3.
Consults Google Gemini via CLI to provide multi-model perspectives on code reviews, architecture, and security audits.
Audits code implementations against predefined plan files to ensure full execution and compliance with project requirements.
Manages granular, claims-based permissions for secure multi-agent coordination and resource access control.
Streamlines C++ testing workflows using GoogleTest, GoogleMock, and CMake to ensure robust, memory-safe code.
Conducts comprehensive security overhauls, threat modeling, and vulnerability remediation to establish secure-by-default software architectures.
Implements comprehensive test-driven development workflows for Django applications and REST APIs using pytest and factory_boy.
Performs comprehensive security scanning and vulnerability detection to ensure codebase integrity and protection against common threats.
Implements stable and maintainable end-to-end testing suites using Playwright patterns and Page Object Model architectures.
Implements robust security protocols for distributed systems including cryptographic verification, threat detection, and key management.
Scroll for more results...