Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

atheris

Python fuzzing with Atheris for discovering vulnerabilities in Python code.

UncategorizedView skill →

analyzing-office365-audit-logs-for-compromise

Parse Office 365 Unified Audit Logs via Microsoft Graph API to detect email forwarding rule creation, inbox delegation, suspicious OAuth app grants, and other indicators of account compromise.

UncategorizedView skill →

analyzing-outlook-pst-for-email-forensics

Analyze Microsoft Outlook PST and OST files for email forensic evidence including message content, headers, attachments, deleted items, and metadata using libpff, pst-utils, and forensic email analysis tools for legal investigations and incident response.

UncategorizedView skill →

analyzing-packed-malware-with-upx-unpacker

>

UncategorizedView skill →

analyzing-pdf-malware-with-pdfid

>

UncategorizedView skill →

analyzing-persistence-mechanisms-in-linux

Detect and analyze Linux persistence mechanisms including crontab entries, systemd service units, LD_PRELOAD hijacking, bashrc modifications, and authorized_keys backdoors using auditd and file integrity monitoring

UncategorizedView skill →

analyzing-powershell-empire-artifacts

Detect PowerShell Empire framework artifacts in Windows event logs by identifying Base64 encoded launcher patterns, default user agents, staging URL structures, stager IOCs, and known Empire module signatures in Script Block Logging events.

UncategorizedView skill →

analyzing-powershell-script-block-logging

>-

UncategorizedView skill →

analyzing-prefetch-files-for-execution-history

Parse Windows Prefetch files to determine program execution history including run counts, timestamps, and referenced files for forensic investigation.

UncategorizedView skill →

analyzing-ransomware-encryption-mechanisms

>

UncategorizedView skill →

analyzing-ransomware-leak-site-intelligence

Monitor and analyze ransomware group data leak sites (DLS) to track victim postings, extract threat intelligence on group tactics, and assess sector-specific ransomware risk for proactive defense.

UncategorizedView skill →

analyzing-ransomware-network-indicators

Identify ransomware network indicators including C2 beaconing patterns, TOR exit node connections, data exfiltration flows, and encryption key exchange via Zeek conn.log and NetFlow analysis

UncategorizedView skill →

analyzing-ransomware-payment-wallets

>

UncategorizedView skill →

analyzing-sbom-for-supply-chain-vulnerabilities

>

UncategorizedView skill →

analyzing-security-logs-with-splunk

>

UncategorizedView skill →

analyzing-slack-space-and-file-system-artifacts

Examine file system slack space, MFT entries, USN journal, and alternate data streams to recover hidden data and reconstruct file activity on NTFS volumes.

UncategorizedView skill →

analyzing-supply-chain-malware-artifacts

Investigate supply chain attack artifacts including trojanized software updates, compromised build pipelines, and sideloaded dependencies to identify intrusion vectors and scope of compromise.

UncategorizedView skill →

analyzing-threat-actor-ttps-with-mitre-attack

MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations. This skill covers systematically mapping threat actor beh

UncategorizedView skill →

analyzing-threat-actor-ttps-with-mitre-navigator

>

UncategorizedView skill →

analyzing-threat-intelligence-feeds

>

UncategorizedView skill →

analyzing-threat-landscape-with-misp

>-

UncategorizedView skill →

analyzing-tls-certificate-transparency-logs

>

UncategorizedView skill →

analyzing-typosquatting-domains-with-dnstwist

Detect typosquatting, homograph phishing, and brand impersonation domains using dnstwist to generate domain permutations and identify registered lookalike domains targeting your organization.

UncategorizedView skill →

analyzing-uefi-bootkit-persistence

>

UncategorizedView skill →

analyzing-usb-device-connection-history

Investigate USB device connection history from Windows registry, event logs, and setupapi logs to track removable media usage and potential data exfiltration.

UncategorizedView skill →

analyzing-web-server-logs-for-intrusion

>-

UncategorizedView skill →

analyzing-windows-amcache-artifacts

>

UncategorizedView skill →

analyzing-windows-event-logs-in-splunk

>

UncategorizedView skill →

analyzing-windows-lnk-files-for-artifacts

Parse Windows LNK shortcut files to extract target paths, timestamps, volume information, and machine identifiers for forensic timeline reconstruction.

UncategorizedView skill →

analyzing-windows-prefetch-with-python

Parse Windows Prefetch files using the windowsprefetch Python library to reconstruct application execution history, detect renamed or masquerading binaries, and identify suspicious program execution patterns.

UncategorizedView skill →

analyzing-windows-registry-for-artifacts

Extract and analyze Windows Registry hives to uncover user activity, installed software, autostart entries, and evidence of system compromise.

UncategorizedView skill →

analyzing-windows-shellbag-artifacts

Analyze Windows Shellbag registry artifacts to reconstruct folder browsing activity, detect access to removable media and network shares, and establish user interaction with directories even after deletion using SBECmd and ShellBags Explorer.

UncategorizedView skill →

anima-theory

ANIMA as limit construction over condensed skill applications. Formalizes prediction markets as belief ANIMAs, structure dishes as condensation media, and impact as equivalence class change. Use for understanding agency at maximum entropy, compositional world modeling, or applying Scholze-Clausen condensed mathematics to AI.

UncategorizedView skill →

anoma-intents

Anoma intent-centric architecture for cross-chain obstruction passing with Geb semantics and Juvix compilation

UncategorizedView skill →

aptos-agent

Interact with Aptos blockchain - check balances, transfer APT, swap tokens, stake, and execute Move view functions. Features game-theoretic decision analysis with Nash equilibrium detection. All transactions require explicit approval.

UncategorizedView skill →

aptos-gf3-society

Aptos GF(3) Society Skill

UncategorizedView skill →

aptos-trading

Execute trades on Aptos mainnet with price-triggered profit-taking and dip-buying strategies. Includes wallet management, transaction signing, and DEX swaps via Liquidswap. Use when automating APT trading, checking balances, or executing swaps.

UncategorizedView skill →

aptos-wallet-mcp

Aptos Wallet MCP Skill

UncategorizedView skill →

aqua-voice-malleability

Adversarial malleability analysis of Aqua Voice Electron app with IPC injection, WebSocket interception, and braided monoidal skill interleaving

UncategorizedView skill →

aristotle-lean

IMO Gold Medal level Lean4 theorem proving via Harmonic API

UncategorizedView skill →

artifacts-builder

Suite of tools for creating elaborate, multi-component claude.ai HTML

UncategorizedView skill →

asi-agent-orama

ASI Agent-O-Rama Skill

UncategorizedView skill →

ask-questions-if-underspecified

Clarify requirements before implementing. Use when serious doubts araise.

UncategorizedView skill →

atproto-ingest

Layer 1 - Data Acquisition for Bluesky/AT Protocol social graph and content.

UncategorizedView skill →

attractor

Invariant set attracting nearby trajectories

UncategorizedView skill →

audit-context-building

Enables ultra-granular, line-by-line code analysis to build deep architectural context before vulnerability or bug finding.

UncategorizedView skill →

audit-prep-assistant

Prepare your codebase for security review using Trail of Bits' checklist. Helps set review goals, runs static analysis tools, increases test coverage, removes dead code, ensures accessibility, and generates comprehensive documentation (flowcharts, user stories, inline comments). (project, gitignored)

UncategorizedView skill →

auditing-aws-s3-bucket-permissions

>

UncategorizedView skill →

auditing-azure-active-directory-configuration

>

UncategorizedView skill →

auditing-cloud-with-cis-benchmarks

>

UncategorizedView skill →

Page 5 of 41 · 2048 results