Loading...
Loading...
Found 133 Skills
Analyzes malware command-and-control (C2) communication protocols to understand beacon patterns, command structures, data encoding, and infrastructure. Covers HTTP, HTTPS, DNS, and custom protocol C2 analysis for detection development and threat intelligence. Activates for requests involving C2 analysis, beacon detection, C2 protocol reverse engineering, or command-and-control infrastructure mapping.
Design distributed systems using Leslie Lamport's rigorous approach. Emphasizes formal reasoning, logical time, consensus protocols, and state machine replication. Use when building systems where correctness under concurrency and partial failure is critical.
A complete guide to developing plugins for the MusicFree music player. Triggered when users request to write, create, or develop MusicFree plugins, or to adapt a music website or API into a MusicFree plugin. Covers the full process including plugin protocols, media type definitions, method signatures, sandbox environment, site analysis, local debugging, release and updates, etc. This Skill is designed for AI execution, guiding AI to collaborate with beginners to complete plugin development.
Expert in video processing, streaming protocols (HLS/DASH/WebRTC), and FFmpeg automation. Specializes in building scalable video infrastructure.
View DeFi portfolio positions across protocols via Nansen CLI. Shows lending, borrowing, LP positions, staking, and yield farming for any wallet address.
DeFi attack pattern playbook. Use when analyzing flash loan attacks, price oracle manipulation, MEV sandwich attacks, governance exploits, bridge vulnerabilities, and token standard edge cases in decentralized finance protocols.
Structured workflow for fact-checking claims in journalism. Use when verifying statements for publication, rating claims for fact-check articles, or building pre-publication verification processes. Includes claim extraction, evidence gathering, rating scales, and correction protocols.
Lab automation platform for Flex/OT-2 robots. Write Protocol API v2 protocols, liquid handling, hardware modules (heater-shaker, thermocycler), labware management, for automated pipetting workflows.
Convert configurations of new protocols like vless+reality to configuration files with ACL4SSR Full NoAuto rules, supporting grouping and traffic splitting, which can be directly uploaded to OpenClash. Trigger words: Merge OpenClash, Convert Subscription, Clash Configuration
Activate when user provides a prompt, SKILL.md, or agent instruction and requests optimization. Transforms weak instructions into reliable, enforceable agent protocols.
Analyzes clinical trial protocols and generates CDISC-compliant (SDTM/ADaM) data schemas. Use when designing data ingestion pipelines for clinical research or preparing regulatory submissions.
Prepare for journalism interviews with research checklists, question frameworks, and attribution guidelines. Use when preparing to interview sources, planning follow-up questions, or managing interview logistics. Covers consent, recording laws, and professional protocols.