Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

auditing-gcp-iam-permissions

>

UncategorizedView skill →

auditing-kubernetes-cluster-rbac

>

UncategorizedView skill →

auditing-terraform-infrastructure-for-security

>

UncategorizedView skill →

auditing-tls-certificate-transparency-logs

>

UncategorizedView skill →

automating-ioc-enrichment

>

UncategorizedView skill →

autopoiesis

Self-producing skill system combining ruler enforcement with skill self-evolution. Implements trifurcation-first imperative via nbb sexp invocation for idempotent agent instruction.

UncategorizedView skill →

babashka-clj

Babashka scripting for fast Clojure execution. JVM-less scripting with GraalVM native compilation and sci interpreter.

UncategorizedView skill →

babashka

Clojure scripting without JVM startup.

UncategorizedView skill →

backend-development

Backend API design, database architecture, microservices patterns, and

UncategorizedView skill →

bafishka

🐟 Rust-native Fish shell-friendly file operations with Steel-backed SCI

UncategorizedView skill →

beeper

Unified messaging via three access tiers — MCP (live API), beeper-cli (authenticated CLI), and direct SQLite→DuckDB (full archive). Search, analyze, and act across all networks. Subsumes beeper-mcp, messaging-world, and signal-messaging.

UncategorizedView skill →

behaviour-surprisal-analysis

Behaviour Surprisal Analysis

UncategorizedView skill →

bidirectional-lens-logic

Hedges' 4-kind lattice for bidirectional programming - covariant/contravariant/invariant/bivariant types with GF(3) correspondence

UncategorizedView skill →

bifurcation-generator

Generate bifurcation diagrams for dynamical systems. Use when visualizing parameter-dependent behavior transitions.

UncategorizedView skill →

bifurcation

Hopf bifurcation detection for dynamical system state transitions with GF(3) phase portraits

UncategorizedView skill →

bigquery

|

UncategorizedView skill →

binary-triage

Performs initial binary triage by surveying memory layout, strings, imports/exports, and functions to quickly understand what a binary does and identify suspicious behavior. Use when first examining a binary, when user asks to triage/survey/analyze a program, or wants an overview before deeper reverse engineering.

UncategorizedView skill →

blackhat-go

Go-based security techniques from "Black Hat Go" extended with macOS, Cloud, Mobile, IoT, Supply Chain, API, Web3, AI/ML, Red Team, ATT&CK, and LLM chapters. 186 techniques, 36 tools, 33 defenses across 37 chapters. Includes adversarial bisimulation games with Ungar (order-dependent) and join-semilattice structures. AAIF-compatible multiplayer agent games for human-agent security exercises.

UncategorizedView skill →

bluesky-jetstream

Bluesky Jetstream Firehose Skill

UncategorizedView skill →

bmorphism-diagrams

bmorphism Diagrams

UncategorizedView skill →

bmorphism-interactome

GitHub interactome explorer for bmorphism/plurigrid ecosystem. Maps collaborations across AlgebraicJulia, Topos Institute, Anthropic, and MCP servers. Use for discovering cobordisms between research communities.

UncategorizedView skill →

bob

World BOB Skill

UncategorizedView skill →

braindance-worlds

GF(3)-conserved distribution of Claude threads across Aptos worlds

UncategorizedView skill →

brand-guidelines

Apply brand colors and typography to artifacts. Use when brand colors,

UncategorizedView skill →

browser-history-acset

Browser History ACSet

UncategorizedView skill →

buberian-relations

Buberian Relations Skill

UncategorizedView skill →

building-adversary-infrastructure-tracking-system

Build an automated system to track adversary infrastructure using passive DNS, certificate transparency, WHOIS data, and IP enrichment to map and monitor threat actor command-and-control networks.

UncategorizedView skill →

building-attack-pattern-library-from-cti-reports

Extract and catalog attack patterns from cyber threat intelligence reports into a structured STIX-based library mapped to MITRE ATT&CK for detection engineering and threat-informed defense.

UncategorizedView skill →

building-automated-malware-submission-pipeline

>

UncategorizedView skill →

building-c2-infrastructure-with-sliver-framework

Build and configure a resilient command-and-control infrastructure using BishopFox's Sliver C2 framework with redirectors, HTTPS listeners, and multi-operator support for authorized red team engagements.

UncategorizedView skill →

building-cloud-siem-with-sentinel

>

UncategorizedView skill →

building-detection-rule-with-splunk-spl

Build effective detection rules using Splunk Search Processing Language (SPL) correlation searches to identify security threats in SOC environments.

UncategorizedView skill →

building-detection-rules-with-sigma

>

UncategorizedView skill →

building-devsecops-pipeline-with-gitlab-ci

Design and implement a comprehensive DevSecOps pipeline in GitLab CI/CD integrating SAST, DAST, container scanning, dependency scanning, and secret detection.

UncategorizedView skill →

building-identity-federation-with-saml-azure-ad

Establish SAML 2.0 identity federation between on-premises Active Directory and Azure AD (Microsoft Entra ID) for seamless cross-domain authentication and SSO to cloud applications.

UncategorizedView skill →

building-identity-governance-lifecycle-process

>

UncategorizedView skill →

building-incident-response-dashboard

>

UncategorizedView skill →

building-incident-response-playbook

>

UncategorizedView skill →

building-incident-timeline-with-timesketch

Build collaborative forensic incident timelines using Timesketch to ingest, normalize, and analyze multi-source event data for attack chain reconstruction and investigation documentation.

UncategorizedView skill →

building-ioc-defanging-and-sharing-pipeline

Build an automated pipeline to defang indicators of compromise (URLs, IPs, domains, emails) for safe sharing and distribute them in STIX format through TAXII feeds and threat intelligence platforms.

UncategorizedView skill →

building-ioc-enrichment-pipeline-with-opencti

OpenCTI is an open-source platform for managing cyber threat intelligence knowledge, built on STIX 2.1 as its native data model. This skill covers building an automated IOC enrichment pipeline using O

UncategorizedView skill →

building-malware-incident-communication-template

Build structured communication templates for malware incidents including stakeholder notifications, executive briefings, technical advisories, and regulatory disclosures with severity-based escalation procedures.

UncategorizedView skill →

building-patch-tuesday-response-process

Establish a structured operational process to triage, test, and deploy Microsoft Patch Tuesday security updates within risk-based remediation SLAs.

UncategorizedView skill →

building-phishing-reporting-button-workflow

Implement a phishing report button in email clients with automated triage workflow that analyzes user-reported suspicious emails and provides feedback to reporters.

UncategorizedView skill →

building-ransomware-playbook-with-cisa-framework

>

UncategorizedView skill →

building-red-team-c2-infrastructure-with-havoc

Deploy and configure the Havoc C2 framework with teamserver, HTTPS listeners, redirectors, and Demon agents for authorized red team operations.

UncategorizedView skill →

building-role-mining-for-rbac-optimization

Apply bottom-up and top-down role mining techniques to discover optimal RBAC roles from existing user-permission assignments, reducing role explosion and enforcing least privilege.

UncategorizedView skill →

building-soc-escalation-matrix

Build a structured SOC escalation matrix defining severity tiers, response SLAs, escalation paths, and notification procedures for security incidents.

UncategorizedView skill →

building-soc-metrics-and-kpi-tracking

>

UncategorizedView skill →

building-soc-playbook-for-ransomware

>

UncategorizedView skill →

Page 6 of 41 · 2048 results