Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,865 skills, Security & Compliance has 1636 skills

Categories

Showing 12 of 1636 skills

Per page
Downloads
Sort
Security & Compliancemembranedev/application-s...

alert-logic

Alert Logic integration. Manage data, records, and automate workflows. Use when the user wants to interact with Alert Logic data.

🇺🇸|EnglishTranslated
4
Security & Compliancemembranedev/application-s...

taxjar

TaxJar integration. Manage Orders, Nexuses, Customers. Use when the user wants to interact with TaxJar data.

🇺🇸|EnglishTranslated
4
Security & Compliancemembranedev/application-s...

dopesecurity

Dope.security integration. Manage data, records, and automate workflows. Use when the user wants to interact with Dope.security data.

🇺🇸|EnglishTranslated
4
Security & Compliancemembranedev/application-s...

code42

Code42 integration. Manage data, records, and automate workflows. Use when the user wants to interact with Code42 data.

🇺🇸|EnglishTranslated
4
Security & Compliancemembranedev/application-s...

nowsecure

NowSecure integration. Manage data, records, and automate workflows. Use when the user wants to interact with NowSecure data.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

path-traversal-lfi

Path traversal and LFI playbook. Use when file paths, download endpoints, include operations, archive extraction, or wrapper behavior may expose filesystem control.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

request-smuggling

HTTP request smuggling and desynchronization testing. Use when front proxies, CDNs, or load balancers disagree with the origin on message framing (Content-Length vs Transfer-Encoding), on HTTP/2→HTTP/1 translation, or when exploring client-side desync via browser fetch pipelines.

🇨🇳|ChineseTranslated
4
Security & Complianceyaklang/hack-skills

api-authorization-and-bola

API authorization and BOLA testing playbook. Use when APIs expose object identifiers, nested resources, hidden writable fields, or weak function-level authorization.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

recon-and-methodology

Reconnaissance and methodology playbook. Use when mapping assets, discovering endpoints, fingerprinting technology, and building a structured testing plan for a new target.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

insecure-source-code-management

Source control and artifact exposure (.git, .svn, .hg, backups, .env). Use when recon finds VCS paths, 403 on hidden dirs, or backup/config leaks during authorized testing.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

hack

Entry P0 primary router for HackSkills. Use when the task involves web application testing, API security assessment, recon, vulnerability triage, exploit path planning, or choosing the right next category skill before any deep topic skill.

🇨🇳|ChineseTranslated
4
Security & Complianceyaklang/hack-skills

sqli-sql-injection

SQL injection playbook. Use when input reaches SQL queries, authentication logic, sorting, filtering, reporting, or DB-specific blind and out-of-band execution paths.

🇺🇸|EnglishTranslated
4
1...6364656667...137
Page