performing-web-application-scanning-with-nikto
Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous files/programs, checks for outdated versions of over 1,250 servers, and identifies ve
performing-web-application-vulnerability-triage
Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to separate true positives from false positives and prioritize remediation.
performing-web-cache-deception-attack
Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.
performing-web-cache-poisoning-attack
Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.
performing-windows-artifact-analysis-with-eric-zimmerman-tools
Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including KAPE, MFTECmd, PECmd, LECmd, JLECmd, and Timeline Explorer for parsing registry hives, prefetch files, event logs, and file system metadata.
performing-wireless-network-penetration-test
Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3 keys, detecting rogue access points, and testing wireless segmentation using Aircrack-ng and related tools.
performing-wireless-security-assessment-with-kismet
Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak encryption, and unauthorized clients through passive RF monitoring.
performing-yara-rule-development-for-detection
Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral indicators in executable files while minimizing false positives.
periodic-orbit
Closed trajectory in phase space
phase-locking
Fixed phase relationship in oscillators
phase-portrait-generator
Generate phase portraits for 2D dynamical systems. Use when visualizing vector fields, nullclines, and trajectories.
phase-space-transformation
Coordinate changes preserving dynamics
pijul-sparse-skills
Sparsity-preserving skill versioning via Pijul patches with GF(3) projection gates
pijul
Pijul patch-based VCS with categorical patch theory for skill versioning
pitchfork
Symmetric bifurcation with symmetry breaking
pkg-memory-bridge
Bridge to PKG systems (Mem0, Graphiti, Solid PODs, Logseq) for individuated information indices
planar-isotopy-screen
Planar Isotopy Screen Mapping
playwright-unworld
Playwright-Unworld Skill: Deterministic Web Automation
playwright
Browser automation via Playwright MCP. Use for web scraping, taking screenshots, interacting with web pages, testing web UIs, and automating browser tasks. Headless browser support.
plr-thread-coloring
PLR (Parallel/Leading-tone/Relative) transitions for thread coloring. One-hot keyspace reduction to GF(3) trits for behavior indexing. Grows perception/action information field capacity through efficient user illusion.
plurigrid-asi-integrated
Unified Plurigrid ASI skill combining ACSets, Gay-MCP colors, bisimulation games, world-hopping, glass-bead synthesis, and triad interleaving for autonomous skill dispersal.
polysimy-effect-chains
Verify multiple effect interpretations through propagator networks with temporal coalgebra bisimulation and common fixpoint solutions.
pptx
Presentation creation, editing, and analysis. When Claude needs to work
pre-agent-ontology
Pre-Agent Ontology Skill
prioritizing-vulnerabilities-with-cvss-scoring
The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum of Incident Response and Security Teams) for assessing vulnerability severity. CVSS v4.0 (r
proof-of-frog
Proof-of-Frog Skill 🐸
property-based-testing
Provides guidance for property-based testing across multiple languages and smart contracts. Use when writing tests, reviewing code with serialization/validation/parsing patterns, designing features, or when property-based testing would provide stronger coverage than example-based tests.
protocol-acset
Model decentralized protocols as attributed C-sets for compositional analysis, interoperability design, and protocol evolution. Apply categorical mathematics to P2P infrastructure.
protocol-evolution-markets
Prediction markets for protocol standard evolution. Bet on which specs survive, fork, or merge using multiverse finance and GF(3) fitness signals.
protocol-reverse-engineering
Master network protocol reverse engineering including packet analysis, protocol dissection, and custom protocol documentation. Use when analyzing network traffic, understanding proprietary protocols, or debugging network communication.
pun-decomposition
Pun Decomposition Skill (MINUS -1)
pymc-bayesian-modeling
Bayesian modeling with PyMC. Build hierarchical models, MCMC (NUTS), variational inference, LOO/WAIC comparison, posterior checks, for probabilistic programming and inference.
python-development
Modern Python development with Python 3.12+, Django, FastAPI, async patterns,
qa-regression
Automate QA regression testing with reusable test skills. Create login
qri-valence
qri-valence skill
quackbot-duckoid
Mechanic wobbling duckoid robot that quacks and generates nonstandard musical scale compositions. Maximally cost-efficient design (~$68 BOM).
quantum-guitar
Coecke's Quantum Guitar: quantising guitar strings via qubit association, ZX-calculus notation, Moth Actias synth integration
quantum-music
Quantum computer music composition and performance using quantum circuits, ZX-calculus notation, and quantum instruments
quarto-julia
Quarto + Julia Skill
quic-channel-grading
|
radare2-hatchery
Radare2 Hatchery
raffle-winner-picker
Picks random winners from lists, spreadsheets, or Google Sheets for giveaways,
random-walk-fusion
Navigate skill graphs via deterministic random walks. Fuses derivational chains, algebraic structure, color determinism, and bidirectional flow for skill recombination.
recovering-deleted-files-with-photorec
Recover deleted files from disk images and storage media using PhotoRec's file signature-based carving engine regardless of file system damage.
recovering-from-ransomware-attack
>
recursive-string-diagrams
recursive-string-diagrams
RedTeam
32 adversarial agents to destroy weak arguments and find fatal flaws — parallel analysis and adversarial validation. USE WHEN red team, attack idea, counterarguments, critique, stress test, poke holes, devil's advocate, find weaknesses, break this, parallel analysis, adversarial validation.
reflow
Information Reflow Skill (ERGODIC 0)
refuse-mediocrity
Reject complacency. Demand excellence. Ship or die.
reverse-engineering-android-malware-with-jadx
>
Page 24 of 41 · 2048 results