Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Secures GitHub Actions workflows against supply chain attacks, credential theft, and script injection through industry-standard hardening practices.
Simplifies end-to-end testing and UI debugging of local web applications using automated Playwright scripts and server management.
Protects AI workflows by sanitizing untrusted external content and preventing prompt injection or malicious code execution.
Generates MITRE ATT&CK Navigator heatmaps and detection gap analysis reports for Advanced Persistent Threat (APT) groups.
Simulates Cross-Site Request Forgery (CSRF) attacks to identify and validate web application vulnerabilities during authorized security assessments.
Hunts for spearphishing campaign indicators across email, endpoint, and network telemetry to detect and document targeted cyber attacks.
Scans Docker images for vulnerabilities, misconfigurations, and secrets using the Aqua Security Trivy engine.
Generates professional, structured cyber threat intelligence reports tailored for executive, operational, and tactical audiences.
Performs comprehensive Bluetooth Low Energy (BLE) security audits to identify vulnerabilities in IoT and wireless devices.
Conducts comprehensive Information Security Management System (ISMS) audits and manages ISO 27001 compliance workflows from gap analysis to certification support.
Conducts systematic audits of high-privilege accounts to enforce least privilege and ensure compliance with security frameworks.
Analyzes and bypasses Content Security Policy (CSP) implementations to identify vulnerabilities and test XSS mitigation effectiveness.
Detects and exploits blind Server-Side Request Forgery vulnerabilities using out-of-band techniques and cloud metadata analysis.
Detects Kerberos Golden Ticket forgery by identifying encryption downgrades and ticket anomalies within Windows Security Event logs.
Identifies and tests SMTP header injection vulnerabilities in web applications to prevent spam relay and phishing attacks.
Audits real-time WebSocket implementations for security flaws like authentication bypass, hijacking, and injection.
Identifies unauthorized credential usage by analyzing NTLM authentication patterns and correlating them with credential dumping activities.
Implements granular USB device control policies across endpoints to prevent data exfiltration and mitigate malware risks from unauthorized removable media.
Detects and analyzes heap spray attacks in memory dumps by identifying NOP sled patterns and suspicious memory allocations using Volatility3.
Identifies and tests for OAuth 2.0 and OpenID Connect vulnerabilities including redirect URI manipulation and token leakage.
Tests and identifies critical injection vulnerabilities in APIs, covering SQL, NoSQL, SSRF, and command injection vectors.
Performs deep packet inspection and forensic analysis of network traffic to identify security threats, data exfiltration, and malicious communications.
Streamlines the systematic process of identifying, testing, and deploying software updates to remediate vulnerabilities across IT infrastructure.
Detects and analyzes anomalous network connections to identify potential command-and-control activity and data exfiltration.
Implements comprehensive external attack surface management to discover, fingerprint, and score the risk of internet-facing assets.
Performs deep-inspection security assessments using system credentials to identify patches, configurations, and hidden vulnerabilities.
Performs automated GraphQL schema extraction and vulnerability assessments to secure API endpoints against common attack vectors.
Detects and analyzes ransomware activity within network logs by identifying C2 beaconing, TOR connections, and data exfiltration patterns.
Monitors and detects unauthorized container escape attempts in real-time using Falco runtime security rules and syscall analysis.
Secures serverless compute platforms by implementing least-privilege IAM roles, secrets management, dependency scanning, and runtime monitoring.
Scroll for more results...