Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,930 skills, Security & Compliance has 1637 skills

Categories

Showing 12 of 1637 skills

Per page
Downloads
Sort
Security & Complianceramzxy/ctf

ctf-pwn

Binary exploitation (pwn) techniques for CTF challenges. Use when exploiting buffer overflows, format strings, heap vulnerabilities, race conditions, or kernel bugs.

🇺🇸|EnglishTranslated
3
Security & Complianceramzxy/ctf

ctf-recon

Target reconnaissance and enumeration for CTF challenges. Use when you need to scan ports, discover services, enumerate web directories, or fingerprint technology stacks.

🇺🇸|EnglishTranslated
3
Security & Complianceg36maid/ctf-arsenal

crypto-tools

Cryptography tools for RSA attacks, classical ciphers, XOR analysis, and frequency analysis in CTF challenges. Trigger: When solving crypto challenges, RSA, XOR, Caesar, or Vigenere ciphers.

🇺🇸|EnglishTranslated
3
10 scripts/Attention
Security & Complianceumbraco/umbraco-cms-backo...

umbraco-mfa-login-provider

Implement MFA login providers for Umbraco backoffice using official docs

🇺🇸|EnglishTranslated
3
Security & Complianceg36maid/ctf-arsenal

ics-traffic

ICS/SCADA protocol analysis and exploitation using Ettercap MITM, Scapy packet crafting, for Modbus/TCP, IEC 104, and DNP3 protocols. Trigger: When analyzing ICS protocols, MITM attacks, Modbus, IEC 104, or DNP3.

🇺🇸|EnglishTranslated
3
7 scripts/Checked
Security & Complianceg36maid/ctf-arsenal

web-exploits

Web vulnerability testing patterns for SQL injection, XSS, CSRF, LFI, SSTI, and file upload bypasses in CTF challenges. Trigger: When testing web applications, SQL injection, XSS, or file uploads.

🇺🇸|EnglishTranslated
3
7 scripts/Attention
Security & Compliancesickn33/antigravity-aweso...

security-compliance-compliance-check

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform compliance audits and provide implementation guidance.

🇺🇸|EnglishTranslated
3
Security & Compliancemelodic-software/claude-c...

data-classification

Data classification framework including sensitivity levels, handling requirements, labeling, and data lifecycle management

🇺🇸|EnglishTranslated
3
Security & Compliancetroykelly/codex-skills

security-reviewer

Use when explicitly asked to run the security-reviewer subagent or when another skill requires the security-reviewer agent card.

🇺🇸|EnglishTranslated
3
Security & Compliancepachoroa/mis_skills

security-audit

Audit installed skills for malicious code, hidden instructions, and security vulnerabilities. Use when users want to scan their skills for potential security issues, verify skill safety before use, or investigate suspicious skill behavior.

🇺🇸|EnglishTranslated
3
1 scripts/Attention
Security & Compliancesherifeldeeb/agentskills

memory-forensics

Analyze volatile memory (RAM) dumps for forensic investigation. Use when investigating malware infections, rootkits, process injection, credential theft, or any incident requiring analysis of system memory state. Supports Windows, Linux, and macOS memory images.

🇺🇸|EnglishTranslated
3
Security & Compliancesherifeldeeb/agentskills

image-generation

Create diagrams, charts, and visual assets for security documentation. Generate network diagrams, architecture visuals, and data visualizations. Use when creating visual content for reports or presentations.

🇺🇸|EnglishTranslated
3
1 scripts/Checked
1...99100101102103...137
Page