Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

detecting-qr-code-phishing-with-email-security

Detect and prevent QR code phishing (quishing) attacks that bypass traditional email security by embedding malicious URLs in QR code images within emails.

UncategorizedView skill →

detecting-rdp-brute-force-attacks

Detect RDP brute force attacks by analyzing Windows Security Event Logs for failed authentication patterns (Event ID 4625), successful logons after failures (Event ID 4624), NLA failures, and source IP frequency analysis.

UncategorizedView skill →

detecting-rootkit-activity

>

UncategorizedView skill →

detecting-s3-data-exfiltration-attempts

>

UncategorizedView skill →

detecting-serverless-function-injection

>

UncategorizedView skill →

detecting-service-account-abuse

Detect abuse of service accounts through anomalous interactive logons, privilege escalation, lateral movement, and unauthorized access patterns.

UncategorizedView skill →

detecting-shadow-api-endpoints

Discover and inventory shadow API endpoints that operate outside documented specifications using traffic analysis, code scanning, and API discovery platforms.

UncategorizedView skill →

detecting-shadow-it-cloud-usage

Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow data using Python pandas for traffic pattern analysis and domain classification.

UncategorizedView skill →

detecting-spearphishing-with-email-gateway

Spearphishing targets specific individuals using personalized, researched content that bypasses generic spam filters. Email security gateways (SEGs) like Microsoft Defender for Office 365, Proofpoint,

UncategorizedView skill →

detecting-sql-injection-via-waf-logs

>-

UncategorizedView skill →

detecting-stuxnet-style-attacks

>

UncategorizedView skill →

detecting-supply-chain-attacks-in-ci-cd

>

UncategorizedView skill →

detecting-suspicious-oauth-application-consent

Detect risky OAuth application consent grants in Azure AD / Microsoft Entra ID using Microsoft Graph API, audit logs, and permission analysis to identify illicit consent grant attacks.

UncategorizedView skill →

detecting-suspicious-powershell-execution

Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts, and constrained language mode evasion.

UncategorizedView skill →

detecting-t1003-credential-dumping-with-edr

Detect OS credential dumping techniques targeting LSASS memory, SAM database, NTDS.dit, and cached credentials using EDR telemetry, Sysmon process access monitoring, and Windows security event correlation.

UncategorizedView skill →

detecting-t1055-process-injection-with-sysmon

Detect process injection techniques (T1055) including classic DLL injection, process hollowing, and APC injection by analyzing Sysmon events for cross-process memory operations, remote thread creation, and anomalous DLL loading patterns.

UncategorizedView skill →

detecting-t1548-abuse-elevation-control-mechanism

Detect abuse of elevation control mechanisms including UAC bypass, sudo exploitation, and setuid/setgid manipulation by monitoring registry modifications, process elevation flags, and unusual parent-child process relationships.

UncategorizedView skill →

detecting-typosquatting-packages-in-npm-pypi

>

UncategorizedView skill →

detecting-wmi-persistence

Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter, EventConsumer, and FilterToConsumerBinding creation.

UncategorizedView skill →

developer-growth-analysis

Analyzes your recent Claude Code chat history to identify coding patterns,

UncategorizedView skill →

differential-review

Security-focused code review of diffs and pull requests using Trail of Bits expertise.

UncategorizedView skill →

dimensional-analysis

Annotates codebases with dimensional analysis comments documenting units, dimensions, and decimal scaling. Use when someone asks to annotate units in a codebase, perform a dimensional analysis, or find vulnerabilities in a DeFi protocol, offchain code, or other blockchain-related codebase with arithmetic. Prevents dimensional mismatches and catches formula bugs early.

UncategorizedView skill →

discopy-operads

DiscoPy Operads Skill

UncategorizedView skill →

discopy

DisCoPy: Python library for computing with string diagrams - monoidal

UncategorizedView skill →

discrete-backprop

Gradient-free optimization via discrete perturbations and trit-based learning

UncategorizedView skill →

doc-coauthoring

Guide users through a structured workflow for co-authoring documentation.

UncategorizedView skill →

docs-acset

Google Docs/Sheets management via ACSet condensation. Transforms documents into GF(3)-typed Interactions, tracks comments/cells, detects saturation when all comments resolved. Use for document workflows, spreadsheet automation, or applying ANIMA principles to Workspace documents.

UncategorizedView skill →

docx

Comprehensive document creation, editing, and analysis with support for

UncategorizedView skill →

domain-name-brainstormer

Generates creative domain name ideas for your project and checks availability

UncategorizedView skill →

drive-acset

Google Drive management via DriveACSet schema with GF(3) triadic routing. Transforms files/folders into typed Interactions, routes to queue fibers, detects saturation for organized-drive-as-condensed-state.

UncategorizedView skill →

duck-agent

DuckDB file discovery agent with verified absolute paths

UncategorizedView skill →

duckdb-ies

Layer 4: IES Interactome Analytics with GF(3) Momentum Tracking

UncategorizedView skill →

duckdb-quadruple-interleave

Chaotic interleaving across local DuckDB databases modeled as coupled quadruple pendula. Random walks both BETWEEN databases and WITHIN tables for context injection.

UncategorizedView skill →

duckdb-spatial

DuckDB Spatial Skill

UncategorizedView skill →

duckdb-timetravel

Layer 3: Temporal Versioning and ACSet Schema Generation for DuckDB

UncategorizedView skill →

ducklake-walk

Ergodic random walks over DuckLake lakehouses with GF(3) triadic concurrent walkers. Society-of-mind coordination for schema exploration.

UncategorizedView skill →

dune-analytics

Query Dune Analytics API for blockchain data, pyUSD flows, stablecoin metrics, and on-chain analytics. Use when analyzing DeFi protocols, token flows, or building dashboards.

UncategorizedView skill →

dwarf-expert

Provides expertise for analyzing DWARF debug files and understanding the DWARF debug format/standard (v3-v5). Triggers when understanding DWARF information, interacting with DWARF files, answering DWARF-related questions, or working with code that parses DWARF data.

UncategorizedView skill →

dynamic-sufficiency-goblin

Self-regulating Goblins actor implementing Ivan Illich's dynamic sufficiency

UncategorizedView skill →

dynamic-sufficiency

Causal state gating via ε-machine. Coworld observer that prevents action

UncategorizedView skill →

dynamical-system-functor

Categorical structure of dynamical systems

UncategorizedView skill →

effective-topos

FloxHub publication `bmorphism/effective-topos` - a comprehensive development

UncategorizedView skill →

eigenvalue-stability

Stability classification via Jacobian eigenvalues

UncategorizedView skill →

elisp

Emacs Lisp reference (106K lines info).

UncategorizedView skill →

emacs-color-chain

Control Emacs via deterministic Gay-MCP color chains — seed-derived palettes drive buffer themes, mode-line, org headers, and window focus

UncategorizedView skill →

emacs-info

Emacs Info documentation system. Navigate and query Info manuals for Emacs, Elisp, and GNU tools.

UncategorizedView skill →

emacs

Emacs ecosystem = elisp + org + gnus + tramp + eglot.

UncategorizedView skill →

entropy-sim2real

Entropy-driven sim2real transfer. Uses maximum entropy RL, domain randomization, and information-theoretic bridging to close the reality gap.

UncategorizedView skill →

entry-point-analyzer

Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by access level (public, admin, role-restricted, contract-only), and generates structured audit reports. Excludes view/pure/read-only functions. Use when auditing smart contracts (Solidity, Vyper, Solana/Rust, Move, TON, CosmWasm) or when asked to find entry points, audit flows, external functions, access control patterns, or privileged operations.

UncategorizedView skill →

enzyme-autodiff

Enzyme.jl Automatic Differentiation Skill

UncategorizedView skill →

Page 11 of 41 · 2048 results