Loading...
Loading...
Found 5212 skills
zebbern
Performs API security assessments including fuzzing, IDOR detection, and penetration testing for bug bounty programs.
zebbern
Provides structured ethical hacking methodology including penetration testing lifecycle, reconnaissance, vulnerability scanning, exploitation, and report writing.
zebbern
Provides essential command references for penetration testing tools including Nmap, Metasploit, Hydra, and Nikto.
gmh5225
Guides research on game anti-cheat systems (EAC, BattlEye, Vanguard), covering architecture, detection methods, and security bypass strategies.
gmh5225
Guides Windows kernel security research including driver development, system callbacks, PatchGuard, DSE, and kernel exploitation techniques.
gmh5225
Guide to reverse engineering tools and techniques for game security research, covering debuggers, disassemblers, and binary analysis.
gmh5225
Provides security guidance for mobile games on Android and iOS, covering reverse engineering, anti-cheat systems, and root/jailbreak detection bypass techniques.
gmh5225
Guide for researching PCIe DMA attacks using FPGA hardware, covering techniques, pcileech, and firmware development for security analysis.
gmh5225
Guide to game hacking techniques including memory manipulation, code injection, and ESP/aimbot development.
TencentBlueKing
Guides modification of IAM RBAC permission models, including resource types, operation permissions, and migration scripts.
TencentBlueKing
Provides architectural guidance for secure authentication modules including IAM integration, RBAC implementation, and OAuth workflows for permission management.
TencentBlueKing
Provides architectural guidance for authentication and authorization modules, including IAM integration, RBAC implementation, and OAuth flows for secure access control.
TencentBlueKing
Guides secure credential management architecture including encryption, authorization, and access control for password, SSH, and token types.
TencentBlueKing
Provides a guide for implementing JWT security authentication, covering token generation, validation, refresh, permission checks, and OAuth2 integration.
TencentBlueKing
Provides guidance for implementing audit logging to track user operations, sensitive actions, and fulfill compliance requirements.
TencentBlueKing
Manages IAM RBAC permission model changes including resource type definition, permission configuration, migration scripts, and callback implementation.
exceptionless
Provides security best practices for Exceptionless codebase including secrets management, input validation, and secure defaults to avoid common vulnerabilities.
OneKeyHQ
Security-first PR review checklist targeting auth, sensitive data, supply-chain risks, and performance while avoiding UI nitpicks.
OneKeyHQ
Audits security and supply-chain risks by comparing code changes between two Git references for pre-release validation.
trailofbits
Guides secure smart contract development with Slither scans, security documentation, and visual diagrams for Ethereum projects.
trailofbits
Scans Solana programs for critical security vulnerabilities including arbitrary CPI and improper PDA validation to aid in code auditing.
trailofbits
Scans TON smart contracts for critical security vulnerabilities including integer-as-boolean misuse and fake Jetton contracts during FunC contract audits.
trailofbits
Scans Substrate pallets for critical security vulnerabilities including arithmetic overflows and bad origin checks.
trailofbits
Identifies insecure application defaults including hardcoded secrets and weak authentication to strengthen security audits and configuration management.