Back to categories
Category

Agent Skills in category: security

260 skills match this category. Browse curated collections and explore related Agent Skills.

software-security

A software security skill that integrates with Project CodeGuard to help AI coding agents write secure code and prevent common vulnerabilities. Use this skill when writing, reviewing, or modifying code to ensure secure-by-default practices are followed.

static-analysisvulnerability-assessmentsecurity-testingsecure-coding
project-codeguard
project-codeguard
36449

1password

Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.

terminalauthenticationapi-key-management
steipete
steipete
2,731407

ghidra

Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.

static-analysisdecompilationreverse-engineeringcall-graph-analysis
mitsuhiko
mitsuhiko
57234

apktool

Android APK unpacking and resource extraction tool for reverse engineering. Use when you need to decode APK files, extract resources, examine AndroidManifest.xml, analyze smali code, or repackage modified APKs.

reverse-engineeringstatic-analysisterminalandroid
BrownFineSecurity
BrownFineSecurity
47984

iotnet

IoT network traffic analyzer for detecting IoT protocols and identifying security vulnerabilities in network communications. Use when you need to analyze network traffic, identify IoT protocols, or assess network security of IoT devices.

iot-devicesnetwork-protocolsprotocol-analysispacket-capture
BrownFineSecurity
BrownFineSecurity
47984

chipsec

Static analysis of UEFI/BIOS firmware dumps using Intel's chipsec framework. Decode firmware structure, detect known malware and rootkits (LoJax, ThinkPwn, HackingTeam, MosaicRegressor), generate EFI executable inventories with hashes, extract NVRAM variables, and parse SPI flash descriptors. Use when analyzing firmware .bin/.rom/.fd/.cap files offline without requiring hardware access.

static-analysisfirmware-analysischipsecuefi
BrownFineSecurity
BrownFineSecurity
47984

telnetshell

Use telnet to interact with IoT device shells for pentesting operations including device enumeration, vulnerability discovery, credential testing, and post-exploitation. Use when the user needs to interact with network-accessible shells, IoT devices, or telnet services.

iot-devicesnetwork-protocolsethical-hackingpost-exploitation
BrownFineSecurity
BrownFineSecurity
47984

picocom

Use picocom to interact with IoT device UART consoles for pentesting operations including device enumeration, vulnerability discovery, bootloader manipulation, and gaining root shells. Use when the user needs to interact with embedded devices, IoT hardware, or serial consoles.

penetration-testingvulnerability-assessmentiot-devicesterminal
BrownFineSecurity
BrownFineSecurity
47984

nmap

Professional network reconnaissance and port scanning using nmap. Supports various scan types (quick, full, UDP, stealth), service detection, vulnerability scanning, and NSE scripts. Use when you need to enumerate network services, detect versions, or perform network reconnaissance.

reconnaissancenetwork-scanningvulnerability-scanningservice-detection
BrownFineSecurity
BrownFineSecurity
47984

wsdiscovery

WS-Discovery protocol scanner for discovering and enumerating ONVIF cameras and IoT devices on the network. Use when you need to discover ONVIF devices, cameras, or WS-Discovery enabled equipment on a network.

network-scanningnetwork-protocolsiot-devicesreconnaissance
BrownFineSecurity
BrownFineSecurity
47984

onvifscan

ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess security of IP cameras or ONVIF-enabled devices.

authentication-testingbrute-forceiot-devicesonvif
BrownFineSecurity
BrownFineSecurity
47984

ffind

Advanced file finder with type detection and filesystem extraction for analyzing firmware and extracting embedded filesystems. Use when you need to analyze firmware files, identify file types, or extract ext2/3/4 or F2FS filesystems.

reconnaissancestatic-analysisfirmware-analysisfilesystem-extraction
BrownFineSecurity
BrownFineSecurity
47984

ghidra

Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.

static-analysiscommand-linereverse-engineeringghidra
mitsuhiko
mitsuhiko
57234

1password

Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.

cliauthenticationcredentials-managementtool-integration
steipete
steipete
91180

secrets-manager

AWS Secrets Manager for secure secret storage and rotation. Use when storing credentials, configuring automatic rotation, managing secret versions, retrieving secrets in applications, or integrating with RDS.

awsiamcloud-securityapi-key-management
itsmostafa
itsmostafa
933415

Shodan Reconnaissance and Pentesting

This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with Shodan," or "discover IoT devices and open ports." It provides comprehensive guidance for using Shodan's search engine, CLI, and API for penetration testing reconnaissance.

shodanreconnaissancepentestingapi
zebbern
zebbern
2,951263

Network 101

This skill should be used when the user asks to "set up a web server", "configure HTTP or HTTPS", "perform SNMP enumeration", "configure SMB shares", "test network services", or needs guidance on configuring and testing network services for penetration testing labs.

network-servicesweb-servernetwork-protocolspentesting
zebbern
zebbern
2,951263

Privilege Escalation Methods

This skill should be used when the user asks to "escalate privileges", "get root access", "become administrator", "privesc techniques", "abuse sudo", "exploit SUID binaries", "Kerberoasting", "pass-the-ticket", "token impersonation", or needs guidance on post-exploitation privilege escalation for Linux or Windows systems.

privilege-escalationpost-exploitationlinuxwindows
zebbern
zebbern
2,951263

Page 13 of 15 · 260 results