Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

reverse-engineering-dotnet-malware-with-dnspy

>

UncategorizedView skill →

reverse-engineering-ios-app-with-frida

>

UncategorizedView skill →

reverse-engineering-malware-with-ghidra

>

UncategorizedView skill →

reverse-engineering-ransomware-encryption-routine

Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and potential decryption opportunities using static and dynamic analysis.

UncategorizedView skill →

reverse-engineering-rust-malware

Reverse engineer Rust-compiled malware using IDA Pro and Ghidra with techniques for handling non-null-terminated strings, crate dependency extraction, and Rust-specific control flow analysis.

UncategorizedView skill →

reverse-engineering

Reverse Engineering Skill

UncategorizedView skill →

reversible-computing

Janus and reversible languages: run programs backwards, time-symmetric computation.

UncategorizedView skill →

rg-flow-acset

RG Flow ACSet Skill

UncategorizedView skill →

rick-roderick

Rick Roderick: Philosophy Under Siege

UncategorizedView skill →

rio-webgpu-tiles

WebGPU tile rendering for Rio Terminal via wgpu and sugarloaf. Extends

UncategorizedView skill →

ruler-maximal

Ruler Maximal Skill

UncategorizedView skill →

ruler

Unified AI agent configuration propagation across 18+ coding assistants.

UncategorizedView skill →

rust

Rust ecosystem = cargo + rustc + clippy + rustfmt.

UncategorizedView skill →

ruzzy

Rust fuzzing with Ruzzy for automated vulnerability discovery.

UncategorizedView skill →

saddle-node

Bifurcation creating/destroying equilibrium pair

UncategorizedView skill →

sandbox-escape-detector

Tests Tizen application sandboxes for privilege escalation and escape vulnerabilities. Validates process isolation and capability limitations.

UncategorizedView skill →

sarif-parsing

Parse, analyze, and process SARIF (Static Analysis Results Interchange Format) files. Use when reading security scan results, aggregating findings from multiple tools, deduplicating alerts, extracting specific vulnerabilities, or integrating SARIF data into CI/CD pipelines.

UncategorizedView skill →

say-ducklake-xor

Parallel thread/DuckLake discovery with XOR uniqueness from gay_seed. Finds "say" or MCP usage, cross-refs with all DuckDB sources, launches bounded parallel ops.

UncategorizedView skill →

say-narration

Use macOS text-to-speech for agent narration and announcements. Sub-agents announce themselves using different language voices speaking English. Use for multi-agent workflows where each agent has a distinct voice identity.

UncategorizedView skill →

scanning-container-images-with-grype

Scan container images for known vulnerabilities using Anchore Grype with SBOM-based matching and configurable severity thresholds.

UncategorizedView skill →

scanning-containers-with-trivy-in-cicd

>

UncategorizedView skill →

scanning-docker-images-with-trivy

Trivy is a comprehensive open-source vulnerability scanner by Aqua Security that detects vulnerabilities in OS packages, language-specific dependencies, misconfigurations, secrets, and license violati

UncategorizedView skill →

scanning-infrastructure-with-nessus

Tenable Nessus is the industry-leading vulnerability scanner used to identify security weaknesses across network infrastructure including servers, workstations, network devices, and operating systems.

UncategorizedView skill →

scanning-kubernetes-manifests-with-kubesec

Perform security risk analysis on Kubernetes resource manifests using Kubesec to identify misconfigurations, privilege escalation risks, and deviations from security best practices.

UncategorizedView skill →

scanning-network-with-nmap-advanced

>

UncategorizedView skill →

scheme

GNU Scheme ecosystem = guile + goblins + hoot + fibers.

UncategorizedView skill →

scrivener

|

UncategorizedView skill →

scry-rerank

>

UncategorizedView skill →

scry-vectors

>

UncategorizedView skill →

scry

>

UncategorizedView skill →

scum-resource

SCUM Resource Skill

UncategorizedView skill →

scum-score

SCUM Score Skill

UncategorizedView skill →

sdr-borges-reafference

SDR (GNU Radio) as self-learning REPL with Borges infinite library exploration, reafference random walks, spectral gap 1/4, and maximally mixed state for agency-enabling signal processing.

UncategorizedView skill →

seatbelt-sandboxer

Generates minimal macOS Seatbelt sandbox configurations. Use when sandboxing, isolating, or restricting macOS applications with allowlist-based profiles.

UncategorizedView skill →

secure-storage-template

Boilerplate code templates for Tizen KeyManager integration. Generates C/C#/.NET code for password-protected secure data storage.

UncategorizedView skill →

secure-workflow-guide

Guide you through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas. (project, gitignored)

UncategorizedView skill →

securing-api-gateway-with-aws-waf

>

UncategorizedView skill →

securing-aws-iam-permissions

>

UncategorizedView skill →

securing-aws-lambda-execution-roles

>

UncategorizedView skill →

securing-azure-with-microsoft-defender

>

UncategorizedView skill →

securing-container-registry-images

>

UncategorizedView skill →

securing-container-registry-with-harbor

Harbor is an open-source container registry that provides security features including vulnerability scanning (integrated Trivy), image signing (Notary/Cosign), RBAC, content trust policies, replicatio

UncategorizedView skill →

securing-github-actions-workflows

>

UncategorizedView skill →

securing-helm-chart-deployments

Secure Helm chart deployments by validating chart integrity, scanning templates for misconfigurations, and enforcing security contexts in Kubernetes releases.

UncategorizedView skill →

securing-historian-server-in-ot-environment

>

UncategorizedView skill →

securing-kubernetes-on-cloud

>

UncategorizedView skill →

securing-remote-access-to-ot-environment

>

UncategorizedView skill →

security-requirement-extraction

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

UncategorizedView skill →

semgrep-rule-creator

Create custom Semgrep rules for detecting bug patterns and security vulnerabilities. This skill should be used when the user explicitly asks to "create a Semgrep rule", "write a Semgrep rule", "make a Semgrep rule", "build a Semgrep rule", or requests detection of a specific bug pattern, vulnerability, or insecure code pattern using Semgrep.

UncategorizedView skill →

semgrep

Run Semgrep static analysis for fast security scanning and pattern matching. Use when asked to scan code with Semgrep, write custom YAML rules, find vulnerabilities quickly, use taint mode, or set up Semgrep in CI/CD pipelines.

UncategorizedView skill →

Page 25 of 41 · 2048 results