Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

performing-web-application-scanning-with-nikto

Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous files/programs, checks for outdated versions of over 1,250 servers, and identifies ve

UncategorizedView skill →

performing-web-application-vulnerability-triage

Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to separate true positives from false positives and prioritize remediation.

UncategorizedView skill →

performing-web-cache-deception-attack

Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.

UncategorizedView skill →

performing-web-cache-poisoning-attack

Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.

UncategorizedView skill →

performing-windows-artifact-analysis-with-eric-zimmerman-tools

Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including KAPE, MFTECmd, PECmd, LECmd, JLECmd, and Timeline Explorer for parsing registry hives, prefetch files, event logs, and file system metadata.

UncategorizedView skill →

performing-wireless-network-penetration-test

Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3 keys, detecting rogue access points, and testing wireless segmentation using Aircrack-ng and related tools.

UncategorizedView skill →

performing-wireless-security-assessment-with-kismet

Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak encryption, and unauthorized clients through passive RF monitoring.

UncategorizedView skill →

performing-yara-rule-development-for-detection

Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral indicators in executable files while minimizing false positives.

UncategorizedView skill →

periodic-orbit

Closed trajectory in phase space

UncategorizedView skill →

phase-locking

Fixed phase relationship in oscillators

UncategorizedView skill →

phase-portrait-generator

Generate phase portraits for 2D dynamical systems. Use when visualizing vector fields, nullclines, and trajectories.

UncategorizedView skill →

phase-space-transformation

Coordinate changes preserving dynamics

UncategorizedView skill →

pijul-sparse-skills

Sparsity-preserving skill versioning via Pijul patches with GF(3) projection gates

UncategorizedView skill →

pijul

Pijul patch-based VCS with categorical patch theory for skill versioning

UncategorizedView skill →

pitchfork

Symmetric bifurcation with symmetry breaking

UncategorizedView skill →

pkg-memory-bridge

Bridge to PKG systems (Mem0, Graphiti, Solid PODs, Logseq) for individuated information indices

UncategorizedView skill →

planar-isotopy-screen

Planar Isotopy Screen Mapping

UncategorizedView skill →

playwright-unworld

Playwright-Unworld Skill: Deterministic Web Automation

UncategorizedView skill →

playwright

Browser automation via Playwright MCP. Use for web scraping, taking screenshots, interacting with web pages, testing web UIs, and automating browser tasks. Headless browser support.

UncategorizedView skill →

plr-thread-coloring

PLR (Parallel/Leading-tone/Relative) transitions for thread coloring. One-hot keyspace reduction to GF(3) trits for behavior indexing. Grows perception/action information field capacity through efficient user illusion.

UncategorizedView skill →

plurigrid-asi-integrated

Unified Plurigrid ASI skill combining ACSets, Gay-MCP colors, bisimulation games, world-hopping, glass-bead synthesis, and triad interleaving for autonomous skill dispersal.

UncategorizedView skill →

polysimy-effect-chains

Verify multiple effect interpretations through propagator networks with temporal coalgebra bisimulation and common fixpoint solutions.

UncategorizedView skill →

pptx

Presentation creation, editing, and analysis. When Claude needs to work

UncategorizedView skill →

pre-agent-ontology

Pre-Agent Ontology Skill

UncategorizedView skill →

prioritizing-vulnerabilities-with-cvss-scoring

The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum of Incident Response and Security Teams) for assessing vulnerability severity. CVSS v4.0 (r

UncategorizedView skill →

proof-of-frog

Proof-of-Frog Skill 🐸

UncategorizedView skill →

property-based-testing

Provides guidance for property-based testing across multiple languages and smart contracts. Use when writing tests, reviewing code with serialization/validation/parsing patterns, designing features, or when property-based testing would provide stronger coverage than example-based tests.

UncategorizedView skill →

protocol-acset

Model decentralized protocols as attributed C-sets for compositional analysis, interoperability design, and protocol evolution. Apply categorical mathematics to P2P infrastructure.

UncategorizedView skill →

protocol-evolution-markets

Prediction markets for protocol standard evolution. Bet on which specs survive, fork, or merge using multiverse finance and GF(3) fitness signals.

UncategorizedView skill →

protocol-reverse-engineering

Master network protocol reverse engineering including packet analysis, protocol dissection, and custom protocol documentation. Use when analyzing network traffic, understanding proprietary protocols, or debugging network communication.

UncategorizedView skill →

pun-decomposition

Pun Decomposition Skill (MINUS -1)

UncategorizedView skill →

pymc-bayesian-modeling

Bayesian modeling with PyMC. Build hierarchical models, MCMC (NUTS), variational inference, LOO/WAIC comparison, posterior checks, for probabilistic programming and inference.

UncategorizedView skill →

python-development

Modern Python development with Python 3.12+, Django, FastAPI, async patterns,

UncategorizedView skill →

qa-regression

Automate QA regression testing with reusable test skills. Create login

UncategorizedView skill →

qri-valence

qri-valence skill

UncategorizedView skill →

quackbot-duckoid

Mechanic wobbling duckoid robot that quacks and generates nonstandard musical scale compositions. Maximally cost-efficient design (~$68 BOM).

UncategorizedView skill →

quantum-guitar

Coecke's Quantum Guitar: quantising guitar strings via qubit association, ZX-calculus notation, Moth Actias synth integration

UncategorizedView skill →

quantum-music

Quantum computer music composition and performance using quantum circuits, ZX-calculus notation, and quantum instruments

UncategorizedView skill →

quarto-julia

Quarto + Julia Skill

UncategorizedView skill →

quic-channel-grading

|

UncategorizedView skill →

radare2-hatchery

Radare2 Hatchery

UncategorizedView skill →

raffle-winner-picker

Picks random winners from lists, spreadsheets, or Google Sheets for giveaways,

UncategorizedView skill →

random-walk-fusion

Navigate skill graphs via deterministic random walks. Fuses derivational chains, algebraic structure, color determinism, and bidirectional flow for skill recombination.

UncategorizedView skill →

recovering-deleted-files-with-photorec

Recover deleted files from disk images and storage media using PhotoRec's file signature-based carving engine regardless of file system damage.

UncategorizedView skill →

recovering-from-ransomware-attack

>

UncategorizedView skill →

recursive-string-diagrams

recursive-string-diagrams

UncategorizedView skill →

RedTeam

32 adversarial agents to destroy weak arguments and find fatal flaws — parallel analysis and adversarial validation. USE WHEN red team, attack idea, counterarguments, critique, stress test, poke holes, devil's advocate, find weaknesses, break this, parallel analysis, adversarial validation.

UncategorizedView skill →

reflow

Information Reflow Skill (ERGODIC 0)

UncategorizedView skill →

refuse-mediocrity

Reject complacency. Demand excellence. Ship or die.

UncategorizedView skill →

reverse-engineering-android-malware-with-jadx

>

UncategorizedView skill →

Page 24 of 41 · 2048 results