Login
Download
Skill UI
Browse and discover
6201+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
JIT
, found
22
results
Default
Newest
Most Downloaded
PostHog Rate Limits
posthog-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
238
Guides on handling PostHog rate limits with exponential backoff, jitter, idempotent keys, queuing, and header monitoring to keep API calls reliable during throttling or retry scenarios.
View Details
Replit Rate Limit Guard
replit-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
60
Provides Replit-specific rate limiting guidance, adding exponential backoff with jitter, deterministic idempotency keys, queue throttling, and header monitoring so apps stay within quotas while retrying safely.
View Details
Retell AI Rate Limits
retellai-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
52
Provides Retell AI clients with structured rate limit handling by combining exponential backoff with jitter, idempotent request keys, header monitoring, and optional queueing so retries stay safe when 429 or limit headers indicate throttling.
View Details
TwinMind Rate Limiter
twinmind-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
500
Provides smart handling of TwinMind API rate limits with exponential backoff, jitter retries, queued request execution, and header monitoring to keep transcriptions and AI operations within quotas while maximizing throughput.
View Details
VastAI Rate Handling
vastai-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
458
Provides Vast.ai-specific rate limit handling with backoff plus jitter, Idempotency key support, and queue-based throttling so API clients can retry safely under 429 responses and monitor headers for throughput control.
View Details
Windsurf Rate Limit Guard
windsurf-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
305
Provides best practices for handling Windsurf API rate limits, adding exponential backoff with jitter, idempotent retries, and queue-based throttling so clients can recover from 429s and maintain throughput.
View Details
Cobalt Strike Profile Analysis
analyzing-cobalt-strike-malleable-profiles
mukul975/Anthropic-Cybersecurity-Skills
476
Parses Cobalt Strike malleable C2 profiles via pyMalleableC2 to pull beacon configs, HTTP communication patterns, sleep/jitter settings, and combines JARM scans for C2 detection when hunting suspected infrastructure or building IDS signatures.
View Details
Zeek Beaconing Detection
detecting-beaconing-patterns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
313
Analyzes Zeek conn.log intervals with ZAT and NumPy to flag low-jitter, periodic connections typical of C2 beaconing, helping SOC teams hunt callbacks with statistical rigor.
View Details
Detect C2 Beaconing Patterns
hunting-for-command-and-control-beaconing
mukul975/Anthropic-Cybersecurity-Skills
178
Detect C2 beaconing patterns by analyzing network telemetry for regular intervals, jitter, and domain reputation to find compromised endpoints communicating with adversary infrastructure before outbreaks escalate.
View Details
Privileged Access Workstation Setup
implementing-privileged-access-workstation
mukul975/Anthropic-Cybersecurity-Skills
220
Guides designing hardened Privileged Access Workstations with device baselines, JIT access, Intune/GPO compliance, and CyberArk or BeyondTrust integration to secure sensitive administrative operations.
View Details
Prev
1
2
Language
简体中文
English