reverse-engineering-android-malware-with-jadx
>
refuse-mediocrity
Reject complacency. Demand excellence. Ship or die.
reflow
Information Reflow Skill (ERGODIC 0)
RedTeam
32 adversarial agents to destroy weak arguments and find fatal flaws — parallel analysis and adversarial validation. USE WHEN red team, attack idea, counterarguments, critique, stress test, poke holes, devil's advocate, find weaknesses, break this, parallel analysis, adversarial validation.
recursive-string-diagrams
recursive-string-diagrams
recovering-from-ransomware-attack
>
recovering-deleted-files-with-photorec
Recover deleted files from disk images and storage media using PhotoRec's file signature-based carving engine regardless of file system damage.
random-walk-fusion
Navigate skill graphs via deterministic random walks. Fuses derivational chains, algebraic structure, color determinism, and bidirectional flow for skill recombination.
raffle-winner-picker
Picks random winners from lists, spreadsheets, or Google Sheets for giveaways,
radare2-hatchery
Radare2 Hatchery
quic-channel-grading
|
quarto-julia
Quarto + Julia Skill
quantum-music
Quantum computer music composition and performance using quantum circuits, ZX-calculus notation, and quantum instruments
quantum-guitar
Coecke's Quantum Guitar: quantising guitar strings via qubit association, ZX-calculus notation, Moth Actias synth integration
quackbot-duckoid
Mechanic wobbling duckoid robot that quacks and generates nonstandard musical scale compositions. Maximally cost-efficient design (~$68 BOM).
qri-valence
qri-valence skill
qa-regression
Automate QA regression testing with reusable test skills. Create login
python-development
Modern Python development with Python 3.12+, Django, FastAPI, async patterns,
pymc-bayesian-modeling
Bayesian modeling with PyMC. Build hierarchical models, MCMC (NUTS), variational inference, LOO/WAIC comparison, posterior checks, for probabilistic programming and inference.
pun-decomposition
Pun Decomposition Skill (MINUS -1)
protocol-reverse-engineering
Master network protocol reverse engineering including packet analysis, protocol dissection, and custom protocol documentation. Use when analyzing network traffic, understanding proprietary protocols, or debugging network communication.
protocol-evolution-markets
Prediction markets for protocol standard evolution. Bet on which specs survive, fork, or merge using multiverse finance and GF(3) fitness signals.
protocol-acset
Model decentralized protocols as attributed C-sets for compositional analysis, interoperability design, and protocol evolution. Apply categorical mathematics to P2P infrastructure.
property-based-testing
Provides guidance for property-based testing across multiple languages and smart contracts. Use when writing tests, reviewing code with serialization/validation/parsing patterns, designing features, or when property-based testing would provide stronger coverage than example-based tests.
proof-of-frog
Proof-of-Frog Skill 🐸
prioritizing-vulnerabilities-with-cvss-scoring
The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum of Incident Response and Security Teams) for assessing vulnerability severity. CVSS v4.0 (r
pre-agent-ontology
Pre-Agent Ontology Skill
pptx
Presentation creation, editing, and analysis. When Claude needs to work
polysimy-effect-chains
Verify multiple effect interpretations through propagator networks with temporal coalgebra bisimulation and common fixpoint solutions.
plurigrid-asi-integrated
Unified Plurigrid ASI skill combining ACSets, Gay-MCP colors, bisimulation games, world-hopping, glass-bead synthesis, and triad interleaving for autonomous skill dispersal.
plr-thread-coloring
PLR (Parallel/Leading-tone/Relative) transitions for thread coloring. One-hot keyspace reduction to GF(3) trits for behavior indexing. Grows perception/action information field capacity through efficient user illusion.
playwright
Browser automation via Playwright MCP. Use for web scraping, taking screenshots, interacting with web pages, testing web UIs, and automating browser tasks. Headless browser support.
playwright-unworld
Playwright-Unworld Skill: Deterministic Web Automation
planar-isotopy-screen
Planar Isotopy Screen Mapping
pkg-memory-bridge
Bridge to PKG systems (Mem0, Graphiti, Solid PODs, Logseq) for individuated information indices
pitchfork
Symmetric bifurcation with symmetry breaking
pijul
Pijul patch-based VCS with categorical patch theory for skill versioning
pijul-sparse-skills
Sparsity-preserving skill versioning via Pijul patches with GF(3) projection gates
phase-space-transformation
Coordinate changes preserving dynamics
phase-portrait-generator
Generate phase portraits for 2D dynamical systems. Use when visualizing vector fields, nullclines, and trajectories.
phase-locking
Fixed phase relationship in oscillators
periodic-orbit
Closed trajectory in phase space
performing-yara-rule-development-for-detection
Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral indicators in executable files while minimizing false positives.
performing-wireless-security-assessment-with-kismet
Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak encryption, and unauthorized clients through passive RF monitoring.
performing-wireless-network-penetration-test
Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3 keys, detecting rogue access points, and testing wireless segmentation using Aircrack-ng and related tools.
performing-windows-artifact-analysis-with-eric-zimmerman-tools
Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including KAPE, MFTECmd, PECmd, LECmd, JLECmd, and Timeline Explorer for parsing registry hives, prefetch files, event logs, and file system metadata.
performing-web-cache-poisoning-attack
Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.
performing-web-cache-deception-attack
Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.
performing-web-application-vulnerability-triage
Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to separate true positives from false positives and prioritize remediation.
performing-web-application-scanning-with-nikto
Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous files/programs, checks for outdated versions of over 1,250 servers, and identifies ve
Page 841 of 1486 · 74266 results
