gay-fokker-planck-staging
Two Fokker-Plancks per staging gate, conditioned on (rama OR goblins)
gay-integration
Gay.jl integration for bisimulation games with proper hue-based trit derivation and GF(3) conservation
gay-julia
Wide-gamut color sampling with splittable determinism using Pigeons.jl
gay-monte-carlo
Gay Monte Carlo Measurements
generating-threat-intelligence-reports
>
geodesic-manifold
Geodesic Manifold Skill
geohash-coloring
Geohash Coloring Skill
gestalt-hacking
Gestalt Hacking Skill (ERGODIC 0)
gesture-hypergestures
Gesture Hypergestures Skill
gf3-constrained-animation
A skill for creating minimal, GF(3)-constrained animations optimized for Slack emoji GIFs
gf3-pr-verify
Verify GF(3) skill conservation on pull requests. Ensures every contribution
gf3-tripartite
GF(3) Tripartite Orchestration
gh-cli
GitHub CLI for repository management. Issues, PRs, releases, and API queries from the command line.
gh-interactome
GitHub author interaction network discovery. Maps cobordisms between
gh
GitHub CLI (212 man pages).
github-api
Orchestrates comprehensive GitHub API access across all services. Intelligently routes API operations to specialized resource files covering authentication, repositories, issues/PRs, workflows, security, and more. Use when implementing GitHub integrations, automating operations, or building applications that interact with GitHub.
glass-hopping
Glass Bead Game + World Hopping via Observational Bridge Types. Navigate possibility space through ordered locale ≪ relations with Narya-verified transitions.
glass-line
Physical substrate layer for Plurigrid ASI — co-deployed fiber optic + geothermal infrastructure providing sensing, communication, energy, and materials extraction through a single bore.
gmail-anima
Gmail inbox management via ANIMA condensation. Transforms messages into GF(3)-typed Interactions, routes to triadic queues, detects saturation for inbox-zero-as-condensed-state. Use for email triage, workflow automation, or applying ANIMA principles to Gmail.
goblins
Distributed object capability system (6.5K lines info).
google-workspace
Google Workspace MCP integration for Gmail, Drive, Calendar, Docs, Sheets, Slides, Forms, Tasks, and Chat. Use when the user wants to read/send emails, manage files, create/edit documents, schedule events, or interact with any Google Workspace service.
goose-introspection
Goose session introspection and self-discovery via DuckDB reafference database. Query past sessions, find self, and enable cross-session awareness.
graph-grafting
Graph Grafting Skill
guidelines-advisor
Comprehensive smart contract development advisor based on Trail of Bits' best practices. Analyzes codebase to generate documentation/specifications, review architecture, check upgradeability patterns, assess implementation quality, identify pitfalls, review dependencies, and evaluate testing. Provides actionable recommendations. (project, gitignored)
birkhoff-average
Time average of observable along trajectory
atheris
Python fuzzing with Atheris for discovering vulnerabilities in Python code.
analyzing-ransomware-leak-site-intelligence
Monitor and analyze ransomware group data leak sites (DLS) to track victim postings, extract threat intelligence on group tactics, and assess sector-specific ransomware risk for proactive defense.
analyzing-ransomware-network-indicators
Identify ransomware network indicators including C2 beaconing patterns, TOR exit node connections, data exfiltration flows, and encryption key exchange via Zeek conn.log and NetFlow analysis
analyzing-ransomware-payment-wallets
>
analyzing-sbom-for-supply-chain-vulnerabilities
>
analyzing-security-logs-with-splunk
>
analyzing-slack-space-and-file-system-artifacts
Examine file system slack space, MFT entries, USN journal, and alternate data streams to recover hidden data and reconstruct file activity on NTFS volumes.
analyzing-supply-chain-malware-artifacts
Investigate supply chain attack artifacts including trojanized software updates, compromised build pipelines, and sideloaded dependencies to identify intrusion vectors and scope of compromise.
analyzing-threat-actor-ttps-with-mitre-attack
MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations. This skill covers systematically mapping threat actor beh
analyzing-threat-actor-ttps-with-mitre-navigator
>
analyzing-threat-intelligence-feeds
>
analyzing-threat-landscape-with-misp
>-
analyzing-tls-certificate-transparency-logs
>
analyzing-typosquatting-domains-with-dnstwist
Detect typosquatting, homograph phishing, and brand impersonation domains using dnstwist to generate domain permutations and identify registered lookalike domains targeting your organization.
analyzing-uefi-bootkit-persistence
>
analyzing-usb-device-connection-history
Investigate USB device connection history from Windows registry, event logs, and setupapi logs to track removable media usage and potential data exfiltration.
analyzing-web-server-logs-for-intrusion
>-
analyzing-windows-amcache-artifacts
>
analyzing-windows-event-logs-in-splunk
>
analyzing-windows-lnk-files-for-artifacts
Parse Windows LNK shortcut files to extract target paths, timestamps, volume information, and machine identifiers for forensic timeline reconstruction.
analyzing-windows-prefetch-with-python
Parse Windows Prefetch files using the windowsprefetch Python library to reconstruct application execution history, detect renamed or masquerading binaries, and identify suspicious program execution patterns.
analyzing-windows-registry-for-artifacts
Extract and analyze Windows Registry hives to uncover user activity, installed software, autostart entries, and evidence of system compromise.
analyzing-windows-shellbag-artifacts
Analyze Windows Shellbag registry artifacts to reconstruct folder browsing activity, detect access to removable media and network shares, and establish user interaction with directories even after deletion using SBECmd and ShellBags Explorer.
anima-theory
ANIMA as limit construction over condensed skill applications. Formalizes prediction markets as belief ANIMAs, structure dishes as condensation media, and impact as equivalence class change. Use for understanding agency at maximum entropy, compositional world modeling, or applying Scholze-Clausen condensed mathematics to AI.
anoma-intents
Anoma intent-centric architecture for cross-chain obstruction passing with Geb semantics and Juvix compilation
Page 312 of 1445 · 72246 results