4. Security & Compliance
Found 3608 skills
telnetshell
BrownFineSecurity
Enables telnet-based interaction with IoT device shells for penetration testing, including device enumeration, vulnerability discovery, and credential testing.
ffind
BrownFineSecurity
Analyzes firmware files, identifies file types, and extracts ext2/3/4 and F2FS embedded filesystems for security assessment.
chipsec
BrownFineSecurity
Performs static analysis on UEFI/BIOS firmware dumps to detect malware, rootkits, and extract critical firmware data without hardware access.
ctf-rev
cyberkaida
Systematically analyzes binaries and obfuscated code in CTF challenges to extract flags, keys, and hidden security information.
deep-analysis
cyberkaida
Performs deep security-focused reverse engineering on binaries to answer specific questions about crypto, C2 addresses, and function behavior with evidence-based findings.
ctf-pwn
cyberkaida
Solves CTF binary exploitation challenges by exploiting memory corruption vulnerabilities such as buffer overflows and ROP.
binary-triage
cyberkaida
Performs initial security analysis of binaries by examining memory layout, strings, imports, and functions to identify suspicious behavior.
ctf-crypto
cyberkaida
Solves CTF cryptography challenges by analyzing weak crypto implementations to extract keys and decrypt data.
auditing-security
CaptainCrouton89
Performs systematic code analysis to identify and remediate vulnerabilities, supporting security assessments, compliance validation, and incident response.
security-integration-tests
alex-ilgayev
Enables creation, execution, and debugging of integration tests for detecting prompt injection vulnerabilities in AI applications.
rot13-encryption
OpenHands
Encrypts and decrypts messages using the ROT13 substitution cipher, a basic cryptographic tool for text obfuscation.
repomix-safe-mixer
daymade
Automatically detects and removes hardcoded credentials from codebases before packaging, ensuring secure distribution and mitigating security risks.
security-auditor
alirezarezvani
Automates security vulnerability scanning for OWASP Top 10, SQLi, XSS, and secrets exposure, triggering on code changes and deployments.
dependency-auditor
alirezarezvani
Scans dependencies for known vulnerabilities using npm audit and pip-audit, triggering alerts before deployments.
secret-scanner
alirezarezvani
Scans code for exposed secrets, API keys, and credentials to prevent accidental exposure during development and commits.
secops-setup-antigravity
Configures Google SecOps Remote MCP Server for Antigravity security tool deployment and management.
secops-triage
Provides expert guidance for prioritizing and responding to security alerts during incident triage.
secops-setup-gemini
Configures Google SecOps Remote MCP Server for Gemini CLI, enabling security tool setup and configuration.
secops-investigate
Provides expert guidance for deep security investigations on cases, entities, or incidents upon user request.
secops-hunt
Provides expert guidance for proactive threat hunting, identifying threads, IOCs, and TTPs to detect and mitigate security threats.
credentials
alinaqi
Manages API keys centrally from Access.txt, enhancing security by eliminating hard-coded credentials.
security
alinaqi
Provides OWASP-compliant security patterns, secrets management, and security testing capabilities for secure application development.
configure-authentication
speakeasy-api
Configures Speakeasy authentication, manages API keys, and resolves authentication issues in CI/CD pipelines and non-interactive environments.
software-security
project-codeguard
Integrates with Project CodeGuard to enforce secure coding practices and prevent common vulnerabilities during development.