reverse-engineering-dotnet-malware-with-dnspy
>
reverse-engineering-ios-app-with-frida
>
reverse-engineering-malware-with-ghidra
>
reverse-engineering-ransomware-encryption-routine
Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and potential decryption opportunities using static and dynamic analysis.
reverse-engineering-rust-malware
Reverse engineer Rust-compiled malware using IDA Pro and Ghidra with techniques for handling non-null-terminated strings, crate dependency extraction, and Rust-specific control flow analysis.
reverse-engineering
Reverse Engineering Skill
reversible-computing
Janus and reversible languages: run programs backwards, time-symmetric computation.
rg-flow-acset
RG Flow ACSet Skill
rick-roderick
Rick Roderick: Philosophy Under Siege
rio-webgpu-tiles
WebGPU tile rendering for Rio Terminal via wgpu and sugarloaf. Extends
ruler-maximal
Ruler Maximal Skill
ruler
Unified AI agent configuration propagation across 18+ coding assistants.
rust
Rust ecosystem = cargo + rustc + clippy + rustfmt.
ruzzy
Rust fuzzing with Ruzzy for automated vulnerability discovery.
saddle-node
Bifurcation creating/destroying equilibrium pair
sandbox-escape-detector
Tests Tizen application sandboxes for privilege escalation and escape vulnerabilities. Validates process isolation and capability limitations.
sarif-parsing
Parse, analyze, and process SARIF (Static Analysis Results Interchange Format) files. Use when reading security scan results, aggregating findings from multiple tools, deduplicating alerts, extracting specific vulnerabilities, or integrating SARIF data into CI/CD pipelines.
say-ducklake-xor
Parallel thread/DuckLake discovery with XOR uniqueness from gay_seed. Finds "say" or MCP usage, cross-refs with all DuckDB sources, launches bounded parallel ops.
say-narration
Use macOS text-to-speech for agent narration and announcements. Sub-agents announce themselves using different language voices speaking English. Use for multi-agent workflows where each agent has a distinct voice identity.
scanning-container-images-with-grype
Scan container images for known vulnerabilities using Anchore Grype with SBOM-based matching and configurable severity thresholds.
scanning-containers-with-trivy-in-cicd
>
scanning-docker-images-with-trivy
Trivy is a comprehensive open-source vulnerability scanner by Aqua Security that detects vulnerabilities in OS packages, language-specific dependencies, misconfigurations, secrets, and license violati
scanning-infrastructure-with-nessus
Tenable Nessus is the industry-leading vulnerability scanner used to identify security weaknesses across network infrastructure including servers, workstations, network devices, and operating systems.
scanning-kubernetes-manifests-with-kubesec
Perform security risk analysis on Kubernetes resource manifests using Kubesec to identify misconfigurations, privilege escalation risks, and deviations from security best practices.
scanning-network-with-nmap-advanced
>
scheme
GNU Scheme ecosystem = guile + goblins + hoot + fibers.
scrivener
|
scry-rerank
>
scry-vectors
>
scry
>
scum-resource
SCUM Resource Skill
scum-score
SCUM Score Skill
sdr-borges-reafference
SDR (GNU Radio) as self-learning REPL with Borges infinite library exploration, reafference random walks, spectral gap 1/4, and maximally mixed state for agency-enabling signal processing.
seatbelt-sandboxer
Generates minimal macOS Seatbelt sandbox configurations. Use when sandboxing, isolating, or restricting macOS applications with allowlist-based profiles.
secure-storage-template
Boilerplate code templates for Tizen KeyManager integration. Generates C/C#/.NET code for password-protected secure data storage.
secure-workflow-guide
Guide you through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas. (project, gitignored)
securing-api-gateway-with-aws-waf
>
securing-aws-iam-permissions
>
securing-aws-lambda-execution-roles
>
securing-azure-with-microsoft-defender
>
securing-container-registry-images
>
securing-container-registry-with-harbor
Harbor is an open-source container registry that provides security features including vulnerability scanning (integrated Trivy), image signing (Notary/Cosign), RBAC, content trust policies, replicatio
securing-github-actions-workflows
>
securing-helm-chart-deployments
Secure Helm chart deployments by validating chart integrity, scanning templates for misconfigurations, and enforcing security contexts in Kubernetes releases.
securing-historian-server-in-ot-environment
>
securing-kubernetes-on-cloud
>
securing-remote-access-to-ot-environment
>
security-requirement-extraction
Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.
semgrep-rule-creator
Create custom Semgrep rules for detecting bug patterns and security vulnerabilities. This skill should be used when the user explicitly asks to "create a Semgrep rule", "write a Semgrep rule", "make a Semgrep rule", "build a Semgrep rule", or requests detection of a specific bug pattern, vulnerability, or insecure code pattern using Semgrep.
semgrep
Run Semgrep static analysis for fast security scanning and pattern matching. Use when asked to scan code with Semgrep, write custom YAML rules, find vulnerabilities quickly, use taint mode, or set up Semgrep in CI/CD pipelines.
Page 25 of 41 · 2048 results