Login
Download
Skill UI
Browse and discover
7282+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
web
, found
510
results
Default
Newest
Most Downloaded
AI-Powered Web Testing
awt-e2e-testing
sickn33/antigravity-awesome-skills
230
This AI-powered skill lets coding assistants execute Playwright-based end-to-end scenarios defined in YAML, using OpenCV/OCR visual matching, platform auto-detection, and failure diagnosis with a learning database to improve tests.
View Details
Forced Browsing Auth Bypass
bypassing-authentication-with-forced-browsing
mukul975/Anthropic-Cybersecurity-Skills
333
Guide that enumerates hidden web paths and APIs with ffuf/Gobuster, compares authenticated vs unauthenticated outcomes, and validates endpoint enforcement during authorized security tests.
View Details
Duo MFA Deployment Guide
configuring-multi-factor-authentication-with-duo
mukul975/Anthropic-Cybersecurity-Skills
268
Covers deploying and configuring Cisco Duo MFA across VPN, RDP, SSH, and web apps with adaptive policies, phishing-resistant authenticators, and monitoring for enterprise compliance.
View Details
JavaScript Malware Deobfuscation
deobfuscating-javascript-malware
mukul975/Anthropic-Cybersecurity-Skills
108
Unpacks layered JavaScript obfuscation used in web attacks by extracting scripts, neutralizing anti-analysis tricks, and decoding string and control-flow hiding so analysts can recover the original malicious logic during phishing, skimmer or dropper investigations.
View Details
Fail2ban Port Scan Guard
detecting-port-scanning-with-fail2ban
mukul975/Anthropic-Cybersecurity-Skills
166
Configures Fail2ban with custom filters, iptables logging, and webhook ban actions to detect port scanning, SSH brute-force, and HTTP probes, automatically blocking offenders and notifying teams for faster incident response.
View Details
Broken Link Hijacking
exploiting-broken-link-hijacking
mukul975/Anthropic-Cybersecurity-Skills
85
Audit web apps for dead external resources, verify claimable domains/cloud assets, and validate broken-link hijacking paths to demonstrate supply-chain and subdomain takeover risks.
View Details
Mobile Deep Link Exploitation
exploiting-deeplink-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
465
Guides security testers through discovering and abusing Android and iOS deep link handling flaws—custom URI schemes, App/Universal Links, intent hijacking, and WebView payloads—to evaluate unauthorized access and injection risks in mobile apps.
View Details
Race Condition Exploit
exploiting-race-condition-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
210
Detect and exploit race condition vulnerabilities in transaction-heavy web flows by orchestrating Turbo Intruder single-packet attacks, threading bursts, and limit overrun checks to bypass rate limits, duplicate transactions, and confirm TOCTOU flaws during authorized assessments.
View Details
Type Juggling Exploits
exploiting-type-juggling-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
351
Guide to abusing PHP loose comparison to bypass authentication, tamper hashes, and manipulate logic during pentests by sending typed payloads via JSON or serialization. Includes payload collections, curl commands, and workflow steps.
View Details
WebSocket Vulnerability Testing
exploiting-websocket-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
231
Guides penetration testers through discovering endpoints, validating authentication, checking for CSWSH, and probing message injection flaws in WebSocket implementations using Burp Suite, wscat/websocat, and custom Python scripts during authorized assessments.
View Details
Feishu Notification Bridge
feishu-notify
wanshuiyin/Auto-claude-code-research-in-sleep
277
Internal Feishu/Lark notification utility that other skills call to push event cards or run interactive dialogs via webhook or bridge, ensuring safe fire-and-forget delivery whenever checkpoints, experiments, reviews, or pipelines change state.
View Details
WebShell Hunting Operations
hunting-for-webshell-activity
mukul975/Anthropic-Cybersecurity-Skills
402
Hunt for webshell deployments on internet-facing servers by analyzing file creation, suspicious process spawning from web services, and anomalous HTTP patterns to enable response teams to validate indicators and contain compromises.
View Details
Prev
1
2
3
...
30
31
32
33
34
35
36
...
41
42
43
Next
Language
简体中文
English