4. Security & Compliance
Found 3608 skills
suricata-offline-evejson
benchflow-ai
Analyzes offline PCAP files with Suricata and validates security events through structured eve.json output.
openssl
benchflow-ai
Expert guidance for OpenSSL operations including certificate generation, key management, and PKI infrastructure setup.
safety-interlocks
benchflow-ai
Enables implementation of safety interlocks and protective mechanisms in control systems to prevent equipment damage and ensure operational safety.
pcap-analysis
benchflow-ai
Provides Python utilities for analyzing network packet captures (PCAP) to compute traffic statistics and support security investigations.
threat-detection
benchflow-ai
Detects malicious network patterns including port scans, DoS attacks, and beaconing behavior using exact thresholds.
code-auditor
mhattingpete
Conducts comprehensive codebase analysis to identify security vulnerabilities, technical debt, and assess code quality and maintainability.
authorization-pundit
ThibautBaissac
Enables policy-based authorization with Pundit for resource access control and role-based permission management.
xxe-testing
anshumanbh
Tests for XML External Entity (XXE) vulnerabilities including file disclosure, SSRF, and denial of service in XML parsing endpoints.
xss-testing
anshumanbh
Validates Cross-Site Scripting (XSS) vulnerabilities including Reflected, Stored, and DOM-based XSS via payload injection and execution observation.
agentic-security-threat-modeling
anshumanbh
Identifies security threats in agentic AI applications by applying the OWASP Top 10 for Agentic Applications framework.
injection-testing
anshumanbh
Validates diverse injection vulnerabilities including SSTI, LDAP, XPath, and more across multiple CWEs for comprehensive security testing.
nosql-injection-testing
anshumanbh
Tests for NoSQL injection vulnerabilities across MongoDB, Cassandra, CouchDB, and Redis, validating operator and query manipulation patterns.
sql-injection-testing
anshumanbh
Validates SQL injection vulnerabilities including blind, time-based, and error-based attacks across multiple database systems and CWE-89 patterns.
authorization-testing
anshumanbh
Validates authorization flaws including IDOR, privilege escalation, and missing access controls through lower-privileged credential testing.
command-injection-testing
anshumanbh
Tests for OS command injection vulnerabilities using direct, blind, and out-of-band injection techniques.
security-audit
TheDecipherist
Audits code and dependencies for security vulnerabilities during PR reviews, dependency checks, and deployment preparation.
malware-analysis
tsale
Performs static and behavioral analysis of PE executables and suspicious files, generating threat intelligence reports for security analysts.
windows-intrusion-timeline-targeted
tsale
Generates a detailed incident timeline for Windows security breaches using event logs, EDR, SIEM data, and triage notes.
initial-incident-intake-scoping
tsale
Provides a first-hour incident intake checklist that generates actionable scope and evidence collection plans for security investigations.
analysing-attack
tsale
Analyzes Mitre ATT&CK tactics, techniques, and sub-techniques for threat detection, threat modeling, and security risk assessment.
suspicious-powershell-hunt-cross-platform-ideas
tsale
Provides hypothesis-driven threat hunting plan for suspicious PowerShell activity with query snippets for security telemetry sources.
email-deliverability
MadAppGang
Provides expert guidance on email authentication, spam prevention, and troubleshooting to ensure high email deliverability rates.
pytm
rohunj
Programmatically creates and maintains security threat models using STRIDE analysis, generating data flow diagrams and automated threat reports for development workflows.
secrets-gitleaks
rohunj
Scans git repositories and codebases for hardcoded secrets using Gitleaks, preventing credential exposure and ensuring compliance with security standards.