Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,667 skills, Security & Compliance has 1631 skills

Categories

Showing 12 of 1631 skills

Per page
Downloads
Sort
Security & Compliancecogine-ai/cogine-dev-skil...

security-best-practices

Use when the user explicitly requests security best practices guidance, a security review or report, or secure-by-default coding help for Python, JavaScript or TypeScript, or Go code.

🇺🇸|EnglishTranslated
1
Security & Compliancemukul975/anthropic-cybers...

analyzing-ransomware-leak-site-intelligence

Monitor and analyze ransomware group data leak sites (DLS) to track victim postings, extract threat intelligence on group tactics, and assess sector-specific ransomware risk for proactive defense.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

configuring-active-directory-tiered-model

Implement Microsoft's Enhanced Security Admin Environment (ESAE) tiered administration model for Active Directory. Covers Tier 0/1/2 separation, privileged access workstations (PAWs), administrative f

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

building-attack-pattern-library-from-cti-reports

Extract and catalog attack patterns from cyber threat intelligence reports into a structured STIX-based library mapped to MITRE ATT&CK for detection engineering and threat-informed defense.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

conducting-api-security-testing

Conducts security testing of REST, GraphQL, and gRPC APIs to identify vulnerabilities in authentication, authorization, rate limiting, input validation, and business logic. The tester uses the OWASP API Security Top 10 as the testing framework, combining Burp Suite interception with Postman collections and custom scripts to test endpoint security at every privilege level. Activates for requests involving API security testing, REST API pentest, GraphQL security assessment, or API vulnerability testing.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancejsonwebtoken/jwt-skills

jwt-decode

Decode and inspect JSON Web Tokens (JWTs) without verification. Use when the user provides a JWT string and wants to see its header, payload, or claims — e.g. "decode this JWT", "what's in this token", "inspect this JWT", "show me the claims", "parse this token". Also triggers on raw JWT strings (three base64url segments separated by dots).

🇺🇸|EnglishTranslated
1
Security & Compliancemukul975/anthropic-cybers...

performing-arp-spoofing-attack-simulation

Simulates ARP spoofing attacks in authorized lab or pentest environments using arpspoof, Ettercap, and Scapy to demonstrate man-in-the-middle risks, test network detection capabilities, and validate ARP inspection countermeasures.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

performing-active-directory-forest-trust-attack

Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust key extraction, cross-forest SID history abuse detection, and inter-realm Kerberos ticket assessment.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

exploiting-ms17-010-eternalblue-vulnerability

MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it

🇺🇸|EnglishTranslated
1
2 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

exploiting-smb-vulnerabilities-with-metasploit

Identifies and exploits SMB protocol vulnerabilities using Metasploit Framework during authorized penetration tests to demonstrate risks from unpatched Windows systems, misconfigured shares, and weak authentication in enterprise networks.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

building-detection-rule-with-splunk-spl

Build effective detection rules using Splunk Search Processing Language (SPL) correlation searches to identify security threats in SOC environments.

🇺🇸|EnglishTranslated
1
2 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

analyzing-web-server-logs-for-intrusion

Parse Apache and Nginx access logs to detect SQL injection attempts, local file inclusion, directory traversal, web scanner fingerprints, and brute-force patterns. Uses regex-based pattern matching against OWASP attack signatures, GeoIP enrichment for source attribution, and statistical anomaly detection for request frequency and response size outliers.

🇺🇸|EnglishTranslated
1
1 scripts/Attention
1...128129130131132...136
Page