74266 Skills Available

Find awesome
Agent Skills

Agent-Skills.md is a agent skills marketplace, to find the right agent skills for you.

Popular searches

hunting-for-dns-tunneling-with-zeek

Detect DNS tunneling and data exfiltration by analyzing Zeek dns.log for high-entropy subdomain queries, excessive query volume, long query lengths, and unusual DNS record types indicating covert channel communication.

plurigrid
plurigrid
165

hunting-for-dns-based-persistence

Hunt for DNS-based persistence mechanisms including DNS hijacking, dangling CNAME records, wildcard DNS abuse, and unauthorized zone modifications using passive DNS databases, SecurityTrails API, and DNS audit log analysis.

plurigrid
plurigrid
165

hunting-for-defense-evasion-via-timestomping

>

plurigrid
plurigrid
165

hunting-for-dcsync-attacks

Detect DCSync attacks by analyzing Windows Event ID 4662 for unauthorized DS-Replication-Get-Changes requests from non-domain-controller accounts.

plurigrid
plurigrid
165

hunting-for-dcom-lateral-movement

>

plurigrid
plurigrid
165

hunting-for-data-staging-before-exfiltration

Detect data staging activity before exfiltration by monitoring for archive creation with 7-Zip/RAR, unusual temp folder access, large file consolidation, and staging directory patterns via EDR and process telemetry

plurigrid
plurigrid
165

hunting-for-data-exfiltration-indicators

Hunt for data exfiltration through network traffic analysis, detecting unusual data flows, DNS tunneling, cloud storage uploads, and encrypted channel abuse.

plurigrid
plurigrid
165

hunting-for-command-and-control-beaconing

Detect C2 beaconing patterns in network traffic using frequency analysis, jitter detection, and domain reputation to identify compromised endpoints communicating with adversary infrastructure.

plurigrid
plurigrid
165

hunting-for-cobalt-strike-beacons

Detect Cobalt Strike beacon network activity using default TLS certificate signatures (serial 8BB00EE), JA3/JA3S/JARM fingerprints, HTTP C2 profile pattern matching, beacon jitter analysis, and named pipe detection via Zeek, Suricata, and Python PCAP analysis.

plurigrid
plurigrid
165

hunting-for-beaconing-with-frequency-analysis

Identify command-and-control beaconing patterns in network traffic by applying statistical frequency analysis, jitter calculation, and coefficient of variation scoring to detect periodic callbacks from compromised endpoints.

plurigrid
plurigrid
165

hunting-for-anomalous-powershell-execution

>

plurigrid
plurigrid
165

hunting-credential-stuffing-attacks

>

plurigrid
plurigrid
165

hunting-advanced-persistent-threats

>

plurigrid
plurigrid
165

hopf

Bifurcation creating limit cycle from equilibrium

plurigrid
plurigrid
165

hoot

Scheme→WebAssembly compiler (4K lines info).

plurigrid
plurigrid
165

homoiconic-rewriting

Unified homoiconic graph rewriting - λ-calculus, interaction nets, ACSets, CUDA parallelism

plurigrid
plurigrid
165

holes

Narya interactive proof development with typed holes

plurigrid
plurigrid
165

hatchery-index

Index of 1057 hatchery repos with GAY.md color assignments. Maps plurigrid/bmorphism/TeglonLabs ecosystem to skills.

plurigrid
plurigrid
165

haskell-diagrams

haskell-diagrams - Declarative Vector Graphics with Diagrams DSL

plurigrid
plurigrid
165

fix-review

Review security fixes and patches for completeness and correctness.

plurigrid
plurigrid
165

finder-color-walk

Finder Color Walk Skill

plurigrid
plurigrid
165

file-organizer

Intelligently organizes your files and folders across your computer by

plurigrid
plurigrid
165

ffmpeg

Media processing (10 man pages).

plurigrid
plurigrid
165

ffmpeg-media

FFmpeg media processing. Video/audio transcoding, stream manipulation, and filter graphs.

plurigrid
plurigrid
165

fasttime-mcp

Maximum velocity MCP execution via geodesic untangling. Maoist self-criticism for why slowtime was ever necessary. Topological cybernetic feedback for ongoing tour discovery.

plurigrid
plurigrid
165

extracting-windows-event-logs-artifacts

Extract, parse, and analyze Windows Event Logs (EVTX) using Chainsaw, Hayabusa, and EvtxECmd to detect lateral movement, persistence, and privilege escalation.

plurigrid
plurigrid
165

extracting-memory-artifacts-with-rekall

>

plurigrid
plurigrid
165

extracting-iocs-from-malware-samples

>

plurigrid
plurigrid
165

extracting-credentials-from-memory-dump

Extract cached credentials, password hashes, Kerberos tickets, and authentication tokens from memory dumps using Volatility and Mimikatz for forensic investigation.

plurigrid
plurigrid
165

extracting-config-from-agent-tesla-rat

Extract embedded configuration from Agent Tesla RAT samples including SMTP/FTP/Telegram exfiltration credentials, keylogger settings, and C2 endpoints using .NET decompilation and memory analysis.

plurigrid
plurigrid
165

extracting-browser-history-artifacts

Extract and analyze browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge for forensic evidence of user web activity.

plurigrid
plurigrid
165

exploiting-zerologon-vulnerability-cve-2020-1472

Exploit the Zerologon vulnerability (CVE-2020-1472) in the Netlogon Remote Protocol to achieve domain controller compromise by resetting the machine account password to empty.

plurigrid
plurigrid
165

exploiting-websocket-vulnerabilities

Testing WebSocket implementations for authentication bypass, cross-site hijacking, injection attacks, and insecure message handling during authorized security assessments.

plurigrid
plurigrid
165

exploiting-vulnerabilities-with-metasploit-framework

The Metasploit Framework is the world's most widely used penetration testing platform, maintained by Rapid7. It contains over 2,300 exploits, 1,200 auxiliary modules, and 400 post-exploitation modules

plurigrid
plurigrid
165

detecting-lateral-movement-in-network

>

plurigrid
plurigrid
165

conducting-api-security-testing

>

plurigrid
plurigrid
165

conducting-cloud-penetration-testing

>

plurigrid
plurigrid
165

conducting-domain-persistence-with-dcsync

Perform DCSync attacks to replicate Active Directory credentials and establish domain persistence by extracting KRBTGT, Domain Admin, and service account hashes for Golden Ticket creation.

plurigrid
plurigrid
165

conducting-external-reconnaissance-with-osint

>

plurigrid
plurigrid
165

conducting-full-scope-red-team-engagement

Plan and execute a comprehensive red team engagement covering reconnaissance through post-exploitation using MITRE ATT&CK-aligned TTPs to evaluate an organization's detection and response capabilities.

plurigrid
plurigrid
165

conducting-internal-network-penetration-test

Execute an internal network penetration test simulating an insider threat or post-breach attacker to identify lateral movement paths, privilege escalation vectors, and sensitive data exposure within the corporate network.

plurigrid
plurigrid
165

conducting-internal-reconnaissance-with-bloodhound-ce

Conduct internal Active Directory reconnaissance using BloodHound Community Edition to map attack paths, identify privilege escalation chains, and discover misconfigurations in domain environments.

plurigrid
plurigrid
165

conducting-malware-incident-response

>

plurigrid
plurigrid
165

conducting-man-in-the-middle-attack-simulation

>

plurigrid
plurigrid
165

conducting-memory-forensics-with-volatility

>

plurigrid
plurigrid
165

conducting-mobile-app-penetration-test

>

plurigrid
plurigrid
165

conducting-network-penetration-test

>

plurigrid
plurigrid
165

conducting-pass-the-ticket-attack

Pass-the-Ticket (PtT) is a lateral movement technique that uses stolen Kerberos tickets (TGT or TGS) to authenticate to services without knowing the user's password. By extracting Kerberos tickets fro

plurigrid
plurigrid
165

conducting-phishing-incident-response

>

plurigrid
plurigrid
165

conducting-post-incident-lessons-learned

Facilitate structured post-incident reviews to identify root causes, document what worked and failed, and produce actionable recommendations to improve future incident response.

plurigrid
plurigrid
165

Page 856 of 1486 · 74266 results

Adoption

Agent Skills are supported by leading AI development tools.

FAQ

Frequently asked questions about Agent Skills.

01

What are Agent Skills?

Agent Skills are reusable, production-ready capability packs for AI agents. Each skill lives in its own folder and is described by a SKILL.md file with metadata and instructions.

02

What does this agent-skills.md site do?

Agent Skills is a curated directory that indexes skill repositories and lets you browse, preview, and download skills in a consistent format.

03

Where are skills stored in a repo?

By default, the site scans the skills/ folder. You can also submit a URL that points directly to a specific skills folder.

04

What is required inside SKILL.md?

SKILL.md must include YAML frontmatter with at least name and description. The body contains the actual guidance and steps for the agent.

05

How can I submit a repo?

Click Submit in the header and paste a GitHub URL that points to a skills folder. We’ll parse it and add any valid skills to the directory.