Back to categories
Category

Agent Skills in category: Uncategorized

72246 skills match this category. Browse curated collections and explore related Agent Skills.

hunting-for-unusual-network-connections

Hunt for unusual network connections by analyzing outbound traffic patterns, rare destinations, non-standard ports, and anomalous connection frequencies from endpoints.

plurigrid
plurigrid
165

hunting-for-unusual-service-installations

Detect suspicious Windows service installations (MITRE ATT&CK T1543.003) by parsing System event logs for Event ID 7045, analyzing service binary paths, and identifying indicators of persistence mechanisms.

plurigrid
plurigrid
165

hunting-for-webshell-activity

Hunt for web shell deployments on internet-facing servers by analyzing file creation in web directories, suspicious process spawning from web servers, and anomalous HTTP patterns.

plurigrid
plurigrid
165

hvm-runtime

HVM Runtime Skill

plurigrid
plurigrid
165

hy-emacs

Hylang Emacs integration with hy-mode, Hyuga LSP, and DisCoPy sexp coloring

plurigrid
plurigrid
165

hyjax-relational

HyJAX Relational Thinking Skill

plurigrid
plurigrid
165

hyperbolic-bulk

On-chain GF(3) entropy storage via Aptos Move - bulk-boundary correspondence where entropy lives in the interior and observables project to agents

plurigrid
plurigrid
165

hyperbolicity

No eigenvalues on imaginary axis (robust dynamics)

plurigrid
plurigrid
165

hythermal

HyThermal Skill

plurigrid
plurigrid
165

iecsat-storage

IECsat Storage Skill

plurigrid
plurigrid
165

ies-flox

FloxHub publication `bmorphism/ies` - a focused development environment

plurigrid
plurigrid
165

ies-triadic

IES Triadic Skill

plurigrid
plurigrid
165

ies

ies

plurigrid
plurigrid
165

ikea-varmblixt-smart-lamp

|

plurigrid
plurigrid
165

image-enhancer

Improves the quality of images, especially screenshots, by enhancing

plurigrid
plurigrid
165

implementing-aes-encryption-for-data-at-rest

AES (Advanced Encryption Standard) is a symmetric block cipher standardized by NIST (FIPS 197) used to protect classified and sensitive data. This skill covers implementing AES-256 encryption in GCM m

plurigrid
plurigrid
165

implementing-alert-fatigue-reduction

>

plurigrid
plurigrid
165

implementing-anti-phishing-training-program

Security awareness training is the human layer of phishing defense. An effective anti-phishing training program combines regular simulations, interactive learning modules, metric tracking, and positiv

plurigrid
plurigrid
165

implementing-anti-ransomware-group-policy

>

plurigrid
plurigrid
165

implementing-api-abuse-detection-with-rate-limiting

Implement API abuse detection using token bucket, sliding window, and adaptive rate limiting algorithms to prevent DDoS, brute force, and credential stuffing attacks.

plurigrid
plurigrid
165

implementing-api-gateway-security-controls

>

plurigrid
plurigrid
165

implementing-api-key-security-controls

>

plurigrid
plurigrid
165

implementing-api-rate-limiting-and-throttling

>

plurigrid
plurigrid
165

implementing-api-schema-validation-security

Implement API schema validation using OpenAPI specifications and JSON Schema to enforce input/output contracts and prevent injection, data exposure, and mass assignment attacks.

plurigrid
plurigrid
165

implementing-api-security-posture-management

Implement API Security Posture Management to continuously discover, classify, and score APIs based on risk while enforcing security policies across the API lifecycle.

plurigrid
plurigrid
165

implementing-api-security-testing-with-42crunch

Implement comprehensive API security testing using the 42Crunch platform to perform static audit and dynamic conformance scanning of OpenAPI specifications.

plurigrid
plurigrid
165

implementing-api-threat-protection-with-apigee

Implement API threat protection using Google Apigee policies including JSON/XML threat protection, OAuth 2.0, SpikeArrest, and Advanced API Security for OWASP Top 10 defense.

plurigrid
plurigrid
165

implementing-application-whitelisting-with-applocker

>

plurigrid
plurigrid
165

implementing-aqua-security-for-container-scanning

Deploy Aqua Security's Trivy scanner to detect vulnerabilities, misconfigurations, secrets, and license issues in container images across CI/CD pipelines and registries.

plurigrid
plurigrid
165

implementing-attack-path-analysis-with-xm-cyber

Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize the 2% of exposures that threaten critical assets.

plurigrid
plurigrid
165

implementing-attack-surface-management

>

plurigrid
plurigrid
165

implementing-aws-config-rules-for-compliance

>

plurigrid
plurigrid
165

implementing-aws-iam-permission-boundaries

Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege limits set by the security team.

plurigrid
plurigrid
165

implementing-aws-macie-for-data-classification

Implement Amazon Macie to automatically discover, classify, and protect sensitive data in S3 buckets using machine learning and pattern matching for PII, financial data, and credentials detection.

plurigrid
plurigrid
165

implementing-aws-nitro-enclave-security

>

plurigrid
plurigrid
165

implementing-aws-security-hub-compliance

>

plurigrid
plurigrid
165

implementing-aws-security-hub

>

plurigrid
plurigrid
165

implementing-azure-ad-privileged-identity-management

Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approval workflows, and access reviews for Azure AD privileged roles.

plurigrid
plurigrid
165

implementing-azure-defender-for-cloud

>

plurigrid
plurigrid
165

implementing-beyondcorp-zero-trust-access-model

>

plurigrid
plurigrid
165

implementing-bgp-security-with-rpki

Implement BGP route origin validation using RPKI with Route Origin Authorizations, RPKI-to-Router protocol, and ROV policies on Cisco and Juniper routers to prevent route hijacking.

plurigrid
plurigrid
165

implementing-browser-isolation-for-zero-trust

>

plurigrid
plurigrid
165

implementing-canary-tokens-for-network-intrusion

>

plurigrid
plurigrid
165

implementing-cisa-zero-trust-maturity-model

Implement the CISA Zero Trust Maturity Model v2.0 across the five pillars of identity, devices, networks, applications, and data to achieve progressive organizational zero trust maturity.

plurigrid
plurigrid
165

implementing-cloud-dlp-for-data-protection

>

plurigrid
plurigrid
165

implementing-cloud-security-posture-management

>

plurigrid
plurigrid
165

implementing-cloud-trail-log-analysis

>

plurigrid
plurigrid
165

implementing-cloud-vulnerability-posture-management

Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source tools like Prowler and ScoutSuite for multi-cloud vulnerability detection.

plurigrid
plurigrid
165

implementing-cloud-waf-rules

>

plurigrid
plurigrid
165

implementing-cloud-workload-protection

>

plurigrid
plurigrid
165

Page 303 of 1445 · 72246 results