2600-magazine
Query and explore the 2600: The Hacker Quarterly magazine archive (1984-present) via DuckDB. Provides structured access to 168+ issues covering hacker culture, security, privacy, telephony, and digital rights without loading full content into context.
21e1b8
Gay MCP skill at invocation 14
1eb40f
Gay MCP skill at invocation 12
1eab21
Gay MCP skill at invocation 3
1ea91a
Gay MCP skill at invocation 27
19d57d
Gay MCP skill at invocation 5
13c0e3
Gay MCP skill at invocation 26
triangle-metrics
Triangle Metrics Skill
reverse-derivative-generator
Triadic skill (generation)
remediating-s3-bucket-misconfiguration
>
reverse-derivative-coordinator
Triadic skill (coordination)
repeller
Invariant set repelling nearby trajectories
performing-soc-tabletop-exercise
>
secure-workflow-guide
Guide you through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas. (project, gitignored)
secure-storage-template
Boilerplate code templates for Tizen KeyManager integration. Generates C/C#/.NET code for password-protected secure data storage.
seatbelt-sandboxer
Generates minimal macOS Seatbelt sandbox configurations. Use when sandboxing, isolating, or restricting macOS applications with allowlist-based profiles.
sdr-borges-reafference
SDR (GNU Radio) as self-learning REPL with Borges infinite library exploration, reafference random walks, spectral gap 1/4, and maximally mixed state for agency-enabling signal processing.
scum-score
SCUM Score Skill
scum-resource
SCUM Resource Skill
scry
>
scry-vectors
>
scry-rerank
>
scrivener
|
scheme
GNU Scheme ecosystem = guile + goblins + hoot + fibers.
scanning-network-with-nmap-advanced
>
scanning-kubernetes-manifests-with-kubesec
Perform security risk analysis on Kubernetes resource manifests using Kubesec to identify misconfigurations, privilege escalation risks, and deviations from security best practices.
scanning-infrastructure-with-nessus
Tenable Nessus is the industry-leading vulnerability scanner used to identify security weaknesses across network infrastructure including servers, workstations, network devices, and operating systems.
scanning-docker-images-with-trivy
Trivy is a comprehensive open-source vulnerability scanner by Aqua Security that detects vulnerabilities in OS packages, language-specific dependencies, misconfigurations, secrets, and license violati
scanning-containers-with-trivy-in-cicd
>
scanning-container-images-with-grype
Scan container images for known vulnerabilities using Anchore Grype with SBOM-based matching and configurable severity thresholds.
say-narration
Use macOS text-to-speech for agent narration and announcements. Sub-agents announce themselves using different language voices speaking English. Use for multi-agent workflows where each agent has a distinct voice identity.
say-ducklake-xor
Parallel thread/DuckLake discovery with XOR uniqueness from gay_seed. Finds "say" or MCP usage, cross-refs with all DuckDB sources, launches bounded parallel ops.
sarif-parsing
Parse, analyze, and process SARIF (Static Analysis Results Interchange Format) files. Use when reading security scan results, aggregating findings from multiple tools, deduplicating alerts, extracting specific vulnerabilities, or integrating SARIF data into CI/CD pipelines.
sandbox-escape-detector
Tests Tizen application sandboxes for privilege escalation and escape vulnerabilities. Validates process isolation and capability limitations.
saddle-node
Bifurcation creating/destroying equilibrium pair
ruzzy
Rust fuzzing with Ruzzy for automated vulnerability discovery.
rust
Rust ecosystem = cargo + rustc + clippy + rustfmt.
ruler
Unified AI agent configuration propagation across 18+ coding assistants.
ruler-maximal
Ruler Maximal Skill
rio-webgpu-tiles
WebGPU tile rendering for Rio Terminal via wgpu and sugarloaf. Extends
rick-roderick
Rick Roderick: Philosophy Under Siege
rg-flow-acset
RG Flow ACSet Skill
reversible-computing
Janus and reversible languages: run programs backwards, time-symmetric computation.
reverse-engineering
Reverse Engineering Skill
reverse-engineering-rust-malware
Reverse engineer Rust-compiled malware using IDA Pro and Ghidra with techniques for handling non-null-terminated strings, crate dependency extraction, and Rust-specific control flow analysis.
reverse-engineering-ransomware-encryption-routine
Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and potential decryption opportunities using static and dynamic analysis.
reverse-engineering-malware-with-ghidra
>
reverse-engineering-ios-app-with-frida
>
reverse-engineering-dotnet-malware-with-dnspy
>
reverse-engineering-android-malware-with-jadx
>
Page 840 of 1486 · 74266 results
