performing-cloud-penetration-testing-with-pacu
>
performing-cloud-storage-forensic-acquisition
Perform forensic acquisition and analysis of cloud storage services including Google Drive, OneDrive, Dropbox, and Box by collecting both API-based remote data and local sync client artifacts from endpoint devices.
performing-container-image-hardening
>
performing-container-security-scanning-with-trivy
Scan container images, filesystems, and Kubernetes manifests for vulnerabilities, misconfigurations, exposed secrets, and license compliance issues using Aqua Security Trivy with SBOM generation and CI/CD integration.
performing-content-security-policy-bypass
Analyze and bypass Content Security Policy implementations to achieve cross-site scripting by exploiting misconfigurations, JSONP endpoints, unsafe directives, and policy injection techniques.
performing-credential-access-with-lazagne
Extract stored credentials from compromised endpoints using the LaZagne post-exploitation tool to recover passwords from browsers, databases, system vaults, and applications during authorized red team operations.
performing-cryptographic-audit-of-application
A cryptographic audit systematically reviews an application's use of cryptographic primitives, protocols, and key management to identify vulnerabilities such as weak algorithms, insecure modes, hardco
performing-csrf-attack-simulation
Testing web applications for Cross-Site Request Forgery vulnerabilities by crafting forged requests that exploit authenticated user sessions during authorized security assessments.
performing-cve-prioritization-with-kev-catalog
Leverage the CISA Known Exploited Vulnerabilities catalog alongside EPSS and CVSS to prioritize CVE remediation based on real-world exploitation evidence.
propagators
Sussman/Radul propagator networks for constraint propagation and bidirectional
resource-sharing
Resource Sharing Skill
performing-graphql-introspection-attack
>
repeller
Invariant set repelling nearby trajectories
reverse-derivative-validator
Triadic skill (validation)
reverse-derivative-coordinator
Triadic skill (coordination)
intercepting-mobile-traffic-with-burpsuite
>
little-schemer
Little Schemer Skill
implementing-secrets-management-with-vault
>
implementing-secret-scanning-with-gitleaks
>
implementing-iec-62443-security-zones
>
performing-access-review-and-certification
Conduct systematic access reviews and certifications to ensure users have appropriate access rights aligned with their roles. This skill covers review campaign design, reviewer selection, risk-based p
performing-access-recertification-with-saviynt
Configure and execute access recertification campaigns in Saviynt Enterprise Identity Cloud to validate user entitlements, revoke excessive access, and maintain compliance with SOX, SOC2, and HIPAA.
pentest-exploit-validation
Proof-driven exploitation with 4-level evidence system, bypass exhaustion protocol, mandatory evidence checklists, and strict EXPLOITED/POTENTIAL/FALSE_POSITIVE classification.
Comprehensive PDF manipulation toolkit for extracting text and tables,
paypal-mcp
PayPal MCP server integration for invoices, payments, subscriptions, disputes, and transaction reporting via @paypal/mcp.
parameter-dependent
Systems varying with external parameters
paperproof-validator
Formal Proof Visualization and Verification for Lean 4
own-goal
Save session goals to org files in the goals-*.org format. Auto-increments rank, classifies theme, writes org entry with properties and task checklist.
owasp-security-check
Security audit guidelines for web applications and REST APIs based on OWASP Top 10 and web security best practices. Use when checking code for vulnerabilities, reviewing auth/authz, auditing APIs, or before production deployment.
ossfuzz
Integration with OSS-Fuzz for continuous fuzzing.
osm-topology
OSM Topology Skill
org
Org-mode manual (25K lines info).
org-babel-execution
Literate programming execution engine via org-babel for polyglot skill execution
ordered-locale
Ordered Locales (Heunen-van der Schaaf 2024): Point-free topology with direction. Frame + compatible preorder with open cone conditions.
ordered-locale-fanout
UPDATED: Now uses proper ordered-locale (Heunen-van der Schaaf 2024). Cocone construction over triadic ordered locale with open cone condition.
openscad-bci-hardware
Parametric OpenSCAD models for BCI electrode holders, paste adapters, headset hooks, pogo combs, fNIRS housings, and eurorack frames. Use when designing, modifying, or 3D-printing brain-computer interface hardware.
opennirscap-build
Build an OpenNIRScap 24-channel fNIRS brain cap from open-source hardware — Altium conversion, BOM sourcing, PCB fab, assembly, firmware flash
opam
OCaml package manager (45 subcommands).
opam-ocaml
OPAM package manager for OCaml. Switch management, dependency resolution, and OCaml toolchain.
onesec-wda
Automate "one sec" app-blocking setup on iOS via Shortcuts automations using WebDriverAgent (WDA). Use when the user wants to bulk-configure one sec for multiple apps on a connected iPhone.
olmoearth-mlx
OlmoEarth MLX: Spatio-Temporal Earth Intelligence
ocaml
OCaml ecosystem = opam + dune + merlin + ocamlformat.
obstruction-learning
Obstruction Learning Skill
oauth-integrations
|
nix-acset-worlding
Model Nix store as Attributed C-Set for dependency verification, GC analysis,
nickel
Nickel configuration language with gradual typing, contracts, and dynamic sufficiency verification. Use for type-safe configs, transformation contracts, and validation pipelines.
networked-system
Dynamical systems on graphs
network
Network tools = tailscale + curl + ssh + nmap.
nerv
NERV - Rapid LocalSend Test with Voice
naturality-factor
Naturality Factor Skill
Page 845 of 1486 · 74266 results
