Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,773 skills, Security & Compliance has 1634 skills

Categories

Showing 12 of 1634 skills

Per page
Downloads
Sort
Security & Complianceyaklang/hack-skills

jndi-injection

JNDI injection playbook. Use when Java applications perform JNDI lookups with attacker-controlled names, especially via Log4j2, Spring, or any code path reaching InitialContext.lookup().

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

recon-for-sec

Entry P1 category router for reconnaissance and methodology. Use when mapping scope, discovering assets, fingerprinting technology, building endpoint inventory, and choosing the first high-value security testing path.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

expression-language-injection

Expression Language injection playbook. Use when Java EL, SpEL, OGNL, or MVEL expressions may evaluate attacker-controlled input in Spring, Struts2, Confluence, or similar frameworks.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

stack-overflow-and-rop

Stack overflow and ROP playbook. Use when exploiting buffer overflows to hijack control flow via return address overwrite, ROP chains, ret2libc, ret2csu, ret2dlresolve, or SROP on Linux userland binaries.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

email-header-injection

Email header injection and spoofing playbook. Use when testing contact forms, email APIs, password reset flows, or any feature that constructs SMTP messages with user-controlled fields. Covers CRLF injection in headers, SPF/DKIM/DMARC bypass, and phishing amplification.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

windows-privilege-escalation

Windows local privilege escalation playbook. Use when you have low-privilege shell access on Windows and need to escalate via token abuse, Potato exploits, service misconfigurations, DLL hijacking, UAC bypass, or registry autoruns.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

linux-privilege-escalation

Linux privilege escalation playbook. Use when you have low-privilege shell access and need to escalate to root via SUID/SGID binaries, capabilities, cron abuse, kernel exploits, misconfigurations, or credential harvesting on Linux systems.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

android-pentesting-tricks

Android pentesting playbook. Use when testing Android applications for SSL pinning bypass, exported component abuse, WebView vulnerabilities, intent redirection, root detection bypass, tapjacking, and backup extraction during authorized mobile security assessments.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

mobile-ssl-pinning-bypass

Mobile SSL pinning bypass playbook. Use when intercepting HTTPS traffic from mobile applications that implement certificate pinning, public key pinning, or SPKI hash pinning on Android and iOS, including React Native, Flutter, and Xamarin frameworks.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

heap-exploitation

Heap exploitation playbook. Use when targeting ptmalloc2/glibc heap vulnerabilities including UAF, double free, overflow, off-by-one/null, and leveraging tcache/fastbin/unsortedbin attacks for arbitrary write or code execution.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

symbolic-execution-tools

Symbolic execution and constraint solving playbook. Use when solving CTF reversing challenges, recovering keys, bypassing checks, or automating binary analysis with angr, Z3, or Unicorn Engine.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

active-directory-kerberos-attacks

Kerberos attack playbook for Active Directory. Use when targeting AD authentication via AS-REP roasting, Kerberoasting, golden/silver/diamond tickets, delegation abuse, or pass-the-ticket attacks.

🇺🇸|EnglishTranslated
5
1...5455565758...137
Page