pkg-memory-bridge
Bridge to PKG systems (Mem0, Graphiti, Solid PODs, Logseq) for individuated information indices
planar-isotopy-screen
Planar Isotopy Screen Mapping
playwright-unworld
Playwright-Unworld Skill: Deterministic Web Automation
playwright
Browser automation via Playwright MCP. Use for web scraping, taking screenshots, interacting with web pages, testing web UIs, and automating browser tasks. Headless browser support.
plr-thread-coloring
PLR (Parallel/Leading-tone/Relative) transitions for thread coloring. One-hot keyspace reduction to GF(3) trits for behavior indexing. Grows perception/action information field capacity through efficient user illusion.
plurigrid-asi-integrated
Unified Plurigrid ASI skill combining ACSets, Gay-MCP colors, bisimulation games, world-hopping, glass-bead synthesis, and triad interleaving for autonomous skill dispersal.
polysimy-effect-chains
Verify multiple effect interpretations through propagator networks with temporal coalgebra bisimulation and common fixpoint solutions.
pptx
Presentation creation, editing, and analysis. When Claude needs to work
pre-agent-ontology
Pre-Agent Ontology Skill
prioritizing-vulnerabilities-with-cvss-scoring
The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum of Incident Response and Security Teams) for assessing vulnerability severity. CVSS v4.0 (r
proof-of-frog
Proof-of-Frog Skill 🐸
property-based-testing
Provides guidance for property-based testing across multiple languages and smart contracts. Use when writing tests, reviewing code with serialization/validation/parsing patterns, designing features, or when property-based testing would provide stronger coverage than example-based tests.
protocol-acset
Model decentralized protocols as attributed C-sets for compositional analysis, interoperability design, and protocol evolution. Apply categorical mathematics to P2P infrastructure.
protocol-evolution-markets
Prediction markets for protocol standard evolution. Bet on which specs survive, fork, or merge using multiverse finance and GF(3) fitness signals.
protocol-reverse-engineering
Master network protocol reverse engineering including packet analysis, protocol dissection, and custom protocol documentation. Use when analyzing network traffic, understanding proprietary protocols, or debugging network communication.
pun-decomposition
Pun Decomposition Skill (MINUS -1)
pymc-bayesian-modeling
Bayesian modeling with PyMC. Build hierarchical models, MCMC (NUTS), variational inference, LOO/WAIC comparison, posterior checks, for probabilistic programming and inference.
python-development
Modern Python development with Python 3.12+, Django, FastAPI, async patterns,
qa-regression
Automate QA regression testing with reusable test skills. Create login
qri-valence
qri-valence skill
quackbot-duckoid
Mechanic wobbling duckoid robot that quacks and generates nonstandard musical scale compositions. Maximally cost-efficient design (~$68 BOM).
quantum-guitar
Coecke's Quantum Guitar: quantising guitar strings via qubit association, ZX-calculus notation, Moth Actias synth integration
quantum-music
Quantum computer music composition and performance using quantum circuits, ZX-calculus notation, and quantum instruments
quarto-julia
Quarto + Julia Skill
quic-channel-grading
|
radare2-hatchery
Radare2 Hatchery
raffle-winner-picker
Picks random winners from lists, spreadsheets, or Google Sheets for giveaways,
random-walk-fusion
Navigate skill graphs via deterministic random walks. Fuses derivational chains, algebraic structure, color determinism, and bidirectional flow for skill recombination.
recovering-deleted-files-with-photorec
Recover deleted files from disk images and storage media using PhotoRec's file signature-based carving engine regardless of file system damage.
recovering-from-ransomware-attack
>
recursive-string-diagrams
recursive-string-diagrams
RedTeam
32 adversarial agents to destroy weak arguments and find fatal flaws — parallel analysis and adversarial validation. USE WHEN red team, attack idea, counterarguments, critique, stress test, poke holes, devil's advocate, find weaknesses, break this, parallel analysis, adversarial validation.
reflow
Information Reflow Skill (ERGODIC 0)
refuse-mediocrity
Reject complacency. Demand excellence. Ship or die.
reverse-engineering-android-malware-with-jadx
>
reverse-engineering-dotnet-malware-with-dnspy
>
reverse-engineering-ios-app-with-frida
>
reverse-engineering-malware-with-ghidra
>
reverse-engineering-ransomware-encryption-routine
Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and potential decryption opportunities using static and dynamic analysis.
reverse-engineering-rust-malware
Reverse engineer Rust-compiled malware using IDA Pro and Ghidra with techniques for handling non-null-terminated strings, crate dependency extraction, and Rust-specific control flow analysis.
reverse-engineering
Reverse Engineering Skill
reversible-computing
Janus and reversible languages: run programs backwards, time-symmetric computation.
rg-flow-acset
RG Flow ACSet Skill
rick-roderick
Rick Roderick: Philosophy Under Siege
rio-webgpu-tiles
WebGPU tile rendering for Rio Terminal via wgpu and sugarloaf. Extends
ruler-maximal
Ruler Maximal Skill
ruler
Unified AI agent configuration propagation across 18+ coding assistants.
rust
Rust ecosystem = cargo + rustc + clippy + rustfmt.
ruzzy
Rust fuzzing with Ruzzy for automated vulnerability discovery.
saddle-node
Bifurcation creating/destroying equilibrium pair
Page 844 of 1486 · 74266 results
