Login
Download
Skill UI
Browse and discover
5970+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Business
, found
24
results
Default
Newest
Most Downloaded
Database Integrity Validator
validating-database-integrity
jeremylongshore/claude-code-plugins-plus-skills
241
Ensures database integrity via the data-validation-engine plugin by automatically enforcing data types, ranges, formats, referential integrity, and business rules whenever validation or database integrity requests arise across multi-database environments.
View Details
Odoo EDI Integration
odoo-edi-connector
sickn33/antigravity-awesome-skills
423
Guides implementing EDI (X12/EDIFACT) with Odoo by mapping transaction sets to business objects, onboarding trading partners, and automating inbound/outbound document flows.
View Details
Voice AI Assistant Core
auri-core
sickn33/antigravity-awesome-skills
429
Auri Core replaces Alexa’s default replies with Claude claude-opus-4-20250805 reasoning, delivering warm, contextual Portuguese conversations, memory persistence, AWS integration, and a persona tuned for follow-up scenarios across Free/Pro/Business plans.
View Details
WhatsApp Cloud API Integration
whatsapp-cloud-api
sickn33/antigravity-awesome-skills
418
Professional WhatsApp Business Cloud API integration guidance for sending text and template messages, managing HMAC-SHA256 webhooks, and automating support flows with Node.js/TypeScript and Python boilerplates.
View Details
Office365 Audit Compromise
analyzing-office365-audit-logs-for-compromise
mukul975/Anthropic-Cybersecurity-Skills
277
Use Microsoft Graph to parse Office 365 Unified Audit Logs, enumerate inbox rules, spotting forwarding, delegation, OAuth grants, and other indicators of business email compromise for detection and investigation workflows.
View Details
Contain Active Breach
containing-active-security-breach
mukul975/Anthropic-Cybersecurity-Skills
352
Guides SOC teams through validating alerts, isolating networks and endpoints, preserving evidence, and disabling compromised accounts to rapidly contain an active breach while minimizing business impact.
View Details
Attack Path Mapping
implementing-attack-path-analysis-with-xm-cyber
mukul975/Anthropic-Cybersecurity-Skills
408
Implement XM Cyber's continuous exposure platform to map end-to-end attack paths, highlight choke points, and prioritize the small set of exposures threatening critical business assets for faster risk reduction.
View Details
Passwordless Auth With Entra
implementing-passwordless-auth-with-microsoft-entra
mukul975/Anthropic-Cybersecurity-Skills
312
Guides deploying Microsoft Entra passwordless authentication with FIDO2 keys, Windows Hello for Business, Authenticator passkeys, and certificate-based methods while configuring authentication method policies and phishing-resistant conditional access.
View Details
Asset Criticality Scoring
performing-asset-criticality-scoring-for-vulns
mukul975/Anthropic-Cybersecurity-Skills
451
Build and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization by business impact, data sensitivity, and recoverability so SLAs focus on the highest-risk systems.
View Details
Web Application Pentest
performing-web-application-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
434
Leverages OWASP WSTG processes and Burp Suite to systematically validate web applications for authentication, authorization, input validation, session, and business-logic flaws ahead of deployment or during compliance checks.
View Details
CVSS Vulnerability Prioritization
prioritizing-vulnerabilities-with-cvss-scoring
mukul975/Anthropic-Cybersecurity-Skills
441
Guides security teams through CVSS v4.0 scoring, vector parsing, and enrichment with EPSS and CISA KEV so vulnerabilities can be ranked and remediated according to threat context and business impact.
View Details
Business Logic Testing
testing-for-business-logic-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
114
Structured guidance for penetration testers to map and manipulate workflows, pricing, and permissions manually when automated scanners miss business logic flaws in e-commerce, finance, or multi-step web applications.
View Details
Prev
1
2
Language
简体中文
English