monitoring-darkweb-sources
>
monitoring-scada-modbus-traffic-anomalies
>
moth-actias
Moth's Actias quantum synth for qubit sonification with Bloch sphere visualization and MIDI control
move-smith-fuzzer
Move Smith Fuzzer Skill
mruler
mruler - Meta-Ruler Skill Governance
mujoco-scenes
Package for creating different scenes in MuJoCo. Compose environments with objects, terrains, and obstacles for robot training.
multiversal-finance
Multiversal Finance: Prediction Markets for Interesting Observations
möbius-color-duality
Möbius inversion for Gay.jl color duality - closes sparsification spine gap
narya-hatchery
Narya Hatchery
narya-proofs
Mechanically verified proofs from Narya event logs. Verifies queue consistency, replay determinism, non-leakage, and GF(3) conservation. Use for proving system invariants, audit trails, or formal verification of event-sourced systems.
naturality-factor
Naturality Factor Skill
nerv
NERV - Rapid LocalSend Test with Voice
network
Network tools = tailscale + curl + ssh + nmap.
networked-system
Dynamical systems on graphs
nickel
Nickel configuration language with gradual typing, contracts, and dynamic sufficiency verification. Use for type-safe configs, transformation contracts, and validation pipelines.
nix-acset-worlding
Model Nix store as Attributed C-Set for dependency verification, GC analysis,
oauth-integrations
|
obstruction-learning
Obstruction Learning Skill
ocaml
OCaml ecosystem = opam + dune + merlin + ocamlformat.
olmoearth-mlx
OlmoEarth MLX: Spatio-Temporal Earth Intelligence
onesec-wda
Automate "one sec" app-blocking setup on iOS via Shortcuts automations using WebDriverAgent (WDA). Use when the user wants to bulk-configure one sec for multiple apps on a connected iPhone.
opam-ocaml
OPAM package manager for OCaml. Switch management, dependency resolution, and OCaml toolchain.
opam
OCaml package manager (45 subcommands).
opennirscap-build
Build an OpenNIRScap 24-channel fNIRS brain cap from open-source hardware — Altium conversion, BOM sourcing, PCB fab, assembly, firmware flash
openscad-bci-hardware
Parametric OpenSCAD models for BCI electrode holders, paste adapters, headset hooks, pogo combs, fNIRS housings, and eurorack frames. Use when designing, modifying, or 3D-printing brain-computer interface hardware.
ordered-locale-fanout
UPDATED: Now uses proper ordered-locale (Heunen-van der Schaaf 2024). Cocone construction over triadic ordered locale with open cone condition.
ordered-locale
Ordered Locales (Heunen-van der Schaaf 2024): Point-free topology with direction. Frame + compatible preorder with open cone conditions.
org-babel-execution
Literate programming execution engine via org-babel for polyglot skill execution
org
Org-mode manual (25K lines info).
osm-topology
OSM Topology Skill
ossfuzz
Integration with OSS-Fuzz for continuous fuzzing.
owasp-security-check
Security audit guidelines for web applications and REST APIs based on OWASP Top 10 and web security best practices. Use when checking code for vulnerabilities, reviewing auth/authz, auditing APIs, or before production deployment.
own-goal
Save session goals to org files in the goals-*.org format. Auto-increments rank, classifies theme, writes org entry with properties and task checklist.
paperproof-validator
Formal Proof Visualization and Verification for Lean 4
parameter-dependent
Systems varying with external parameters
paypal-mcp
PayPal MCP server integration for invoices, payments, subscriptions, disputes, and transaction reporting via @paypal/mcp.
Comprehensive PDF manipulation toolkit for extracting text and tables,
pentest-exploit-validation
Proof-driven exploitation with 4-level evidence system, bypass exhaustion protocol, mandatory evidence checklists, and strict EXPLOITED/POTENTIAL/FALSE_POSITIVE classification.
performing-access-recertification-with-saviynt
Configure and execute access recertification campaigns in Saviynt Enterprise Identity Cloud to validate user entitlements, revoke excessive access, and maintain compliance with SOX, SOC2, and HIPAA.
performing-access-review-and-certification
Conduct systematic access reviews and certifications to ensure users have appropriate access rights aligned with their roles. This skill covers review campaign design, reviewer selection, risk-based p
implementing-secret-scanning-with-gitleaks
>
implementing-secrets-management-with-vault
>
intercepting-mobile-traffic-with-burpsuite
>
little-schemer
Little Schemer Skill
hunting-for-shadow-copy-deletion
Hunt for Volume Shadow Copy deletion activity that indicates ransomware preparation or anti-forensics by monitoring vssadmin, wmic, and PowerShell shadow copy commands.
hunting-for-spearphishing-indicators
Hunt for spearphishing campaign indicators across email logs, endpoint telemetry, and network data to detect targeted email attacks.
hunting-for-startup-folder-persistence
Detect T1547.001 startup folder persistence by monitoring Windows startup directories for suspicious file creation, analyzing autoruns entries, and using Python watchdog for real-time filesystem monitoring.
hunting-for-supply-chain-compromise
Hunt for supply chain compromise indicators including trojanized software updates, compromised dependencies, unauthorized code modifications, and tampered build artifacts.
hunting-for-suspicious-scheduled-tasks
Hunt for adversary persistence and execution via Windows scheduled tasks by analyzing task creation events, suspicious task properties, and unusual execution patterns that indicate T1053.005 abuse.
hunting-for-t1098-account-manipulation
Hunt for MITRE ATT&CK T1098 account manipulation including shadow admin creation, SID history injection, group membership changes, and credential modifications using Windows Security Event Logs.
Page 302 of 1445 · 72246 results