Login
Download
Skill UI
Browse and discover
6044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
JIT
, found
24
results
Default
Newest
Most Downloaded
PostHog Rate Limits
posthog-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
238
Guides on handling PostHog rate limits with exponential backoff, jitter, idempotent keys, queuing, and header monitoring to keep API calls reliable during throttling or retry scenarios.
View Details
Replit Rate Limit Guard
replit-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
60
Provides Replit-specific rate limiting guidance, adding exponential backoff with jitter, deterministic idempotency keys, queue throttling, and header monitoring so apps stay within quotas while retrying safely.
View Details
Retell AI Rate Limits
retellai-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
52
Provides Retell AI clients with structured rate limit handling by combining exponential backoff with jitter, idempotent request keys, header monitoring, and optional queueing so retries stay safe when 429 or limit headers indicate throttling.
View Details
TwinMind Rate Limiter
twinmind-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
500
Provides smart handling of TwinMind API rate limits with exponential backoff, jitter retries, queued request execution, and header monitoring to keep transcriptions and AI operations within quotas while maximizing throughput.
View Details
VastAI Rate Handling
vastai-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
458
Provides Vast.ai-specific rate limit handling with backoff plus jitter, Idempotency key support, and queue-based throttling so API clients can retry safely under 429 responses and monitor headers for throughput control.
View Details
Windsurf Rate Limit Guard
windsurf-rate-limits
jeremylongshore/claude-code-plugins-plus-skills
305
Provides best practices for handling Windsurf API rate limits, adding exponential backoff with jitter, idempotent retries, and queue-based throttling so clients can recover from 429s and maintain throughput.
View Details
Cobalt Strike Profile Analysis
analyzing-cobalt-strike-malleable-profiles
mukul975/Anthropic-Cybersecurity-Skills
476
Parses Cobalt Strike malleable C2 profiles via pyMalleableC2 to pull beacon configs, HTTP communication patterns, sleep/jitter settings, and combines JARM scans for C2 detection when hunting suspected infrastructure or building IDS signatures.
View Details
Cobalt Strike Profile Analysis
analyzing-cobaltstrike-malleable-c2-profiles
mukul975/Anthropic-Cybersecurity-Skills
170
Parse Cobalt Strike Malleable C2 profiles with dissect.cobaltstrike and pyMalleableC2 to extract HTTP indicators, jitter/sleep settings, DNS and injection configs, then craft Suricata/Snort signatures for detection.
View Details
Beaconing Detection with Zeek
detecting-beaconing-patterns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
140
Loads Zeek conn.log via ZAT into Pandas to analyze connection intervals, computing jitter and flagging low-std periodic flows to catch C2 beaconing during network threat hunting.
View Details
Beaconing Frequency Hunting
hunting-for-beaconing-with-frequency-analysis
mukul975/Anthropic-Cybersecurity-Skills
441
Applies statistical frequency analysis, jitter scoring, and telemetry enrichment to detect command-and-control beaconing patterns and prioritize suspicious periodic callbacks for proactive threat hunting.
View Details
Detect C2 Beaconing Patterns
hunting-for-command-and-control-beaconing
mukul975/Anthropic-Cybersecurity-Skills
469
Detect C2 beaconing patterns by analyzing network telemetry for regular intervals, jitter, and domain reputation to find compromised endpoints communicating with adversary infrastructure before outbreaks escalate.
View Details
Privileged Access Workstation
implementing-privileged-access-workstation
mukul975/Anthropic-Cybersecurity-Skills
240
Guides teams through designing and deploying Privileged Access Workstations with hardened baselines, JIT admin rights, compliance checks, and CyberArk/BeyondTrust integration for secure admin operations.
View Details
Prev
1
2
Language
简体中文
English