Login
Download
Skill UI
Browse and discover
6557+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Memory Analysis
, found
12
results
Default
Newest
Most Downloaded
Capacity Planning Analysis
analyzing-capacity-planning
jeremylongshore/claude-code-plugins-plus-skills
307
Helps analyze current CPU, memory, storage, and network utilization to forecast future infrastructure needs, identify bottlenecks, and recommend scaling tactics with cost context for proactive capacity management.
View Details
Capacity Planning Analysis
analyzing-capacity-planning
jeremylongshore/claude-code-plugins-plus-skills
307
Helps analyze current CPU, memory, storage, and network utilization to forecast future infrastructure needs, identify bottlenecks, and recommend scaling tactics with cost context for proactive capacity management.
View Details
Guidewire Debug Bundle
guidewire-debug-bundle
jeremylongshore/claude-code-plugins-plus-skills
327
Guidewire Debug Bundle consolidates Gosu and cloud API tracing, log analysis, and JVM profiling to resolve InsuranceSuite issues, from attachable remote debugging through IntelliJ to query plan and memory inspections.
View Details
Memory Forensics Toolkit
memory-forensics
sickn33/antigravity-awesome-skills
422
Memory Forensics Toolkit consolidates guidance for acquiring memory dumps, running Volatility analysis, and following incident response workflows to triage malware and forensic cases.
View Details
Pandas Pro Workflow
pandas-pro
Jeffallan/claude-skills
57
Expert pandas helper for efficient DataFrame analysis, cleaning, merging, grouping, resampling, and pivoting with vectorized operations, dtype tuning, memory checks, and validation.
View Details
Performance Profiling Fundamentals
performance-profiling
sickn33/antigravity-awesome-skills
67
Guides measuring, analyzing, and optimizing web performance through a structured workflow, Lighthouse/DevTools scripts, bundle analysis, memory/runtime inspections, quick wins, and anti-pattern avoidance.
View Details
RetellAI Advanced Debugging
retellai-advanced-troubleshooting
jeremylongshore/claude-code-plugins-plus-skills
256
Guides engineers in assembling logging, tracing, network, and metrics bundles for Retell AI, then walks through layer-by-layer isolation, timing and memory analysis, and escalation packaging when ordinary troubleshooting fails.
View Details
Bootkit Rootkit Analysis
analyzing-bootkit-and-rootkit-samples
mukul975/Anthropic-Cybersecurity-Skills
231
Walks analysts through acquiring MBR/VBR/UEFI firmware dumps, disassembling boot sectors, auditing firmware modules, and running kernel memory forensics to detect bootkits and rootkits persisting below the OS.
View Details
Heap Spray Exploitation Analysis
analyzing-heap-spray-exploitation
mukul975/Anthropic-Cybersecurity-Skills
454
Guides analysts through Volatility3-based heap spray detection in memory dumps, highlighting NOP sled and shellcode zones, suspicious allocations, and producing JSON reports for investigations.
View Details
Linux Kernel Rootkit Analysis
analyzing-linux-kernel-rootkits
mukul975/Anthropic-Cybersecurity-Skills
393
Detect kernel-level rootkits in Linux memory dumps using Volatility3 plugins, /proc vs /sys cross-view checks, and live rkhunter/chkrootkit scans to document hooked syscalls, hidden modules, and tampered structures for SOC analysts.
View Details
Endpoint Forensics Investigation
performing-endpoint-forensics-investigation
mukul975/Anthropic-Cybersecurity-Skills
300
Performs endpoint-focused digital forensics including memory acquisition, disk imaging, artifact analysis, and timeline reconstruction so teams can investigate compromises, gather court-ready evidence, and understand incident scope.
View Details
PLC Firmware Security Analysis
performing-plc-firmware-security-analysis
mukul975/Anthropic-Cybersecurity-Skills
161
Analyzes PLC firmware images to identify hardcoded credentials, insecure updates, backdoors, memory corruption, and debug interfaces, using extraction from Siemens, Rockwell, and Schneider platforms plus static/dynamic inspection and baseline comparison to validate security.
View Details
1
Language
简体中文
English