Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,930 skills, Security & Compliance has 1637 skills

Categories

Showing 12 of 1637 skills

Per page
Downloads
Sort
Security & Complianceyaklang/hack-skills

nosql-injection

NoSQL injection playbook. Use when MongoDB-style operators, JSON query objects, flexible search filters, or backend query DSLs may allow data or logic abuse.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

unauthorized-access-common-services

Unauthorized access playbook for common exposed services. Use when Redis, Rsync, PHP-FPM, AJP/Ghostcat, Hadoop YARN, H2 Console, or similar management interfaces are exposed without authentication.

🇺🇸|EnglishTranslated
4
Security & Compliancemembranedev/application-s...

pliance

Pliance integration. Manage data, records, and automate workflows. Use when the user wants to interact with Pliance data.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

tunneling-and-pivoting

Tunneling and pivoting playbook. Use when establishing network tunnels through compromised hosts including SSH tunneling, Chisel, Ligolo-ng, socat, DNS/ICMP/HTTP tunneling, ProxyChains, and multi-layer pivoting strategies.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

subdomain-takeover

Subdomain takeover detection and exploitation playbook. Use when targets have dangling CNAME/NS/MX records pointing to deprovisioned cloud resources, expired third-party services, or unclaimed SaaS tenants that an attacker can register to serve content under the victim's domain.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

dangling-markup-injection

Dangling markup injection playbook. Use when HTML injection is possible but JavaScript execution is blocked (CSP, sanitizer strips event handlers, WAF blocks script tags) — exfiltrate CSRF tokens, session data, and page content by injecting unclosed HTML tags that capture subsequent page content.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

rsa-attack-techniques

RSA attack playbook for CTF and real-world cryptanalysis. Use when given RSA parameters (n, e, c) and need to recover plaintext by exploiting weak keys, small exponents, shared factors, or padding oracles.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

llm-prompt-injection

LLM prompt injection playbook. Use when testing AI/LLM applications for direct injection, indirect injection via RAG/browsing, tool abuse, data exfiltration, MCP security risks, and defense bypass techniques.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

kubernetes-pentesting

Kubernetes penetration testing playbook. Use when targeting Kubernetes clusters via API server, RBAC enumeration, service account abuse, etcd access, Kubelet API, pod escape, cloud-specific metadata, admission webhook bypass, and registry secrets.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

browser-exploitation-v8

Browser and V8 exploitation playbook. Use when exploiting JavaScript engine vulnerabilities including JIT type confusion, incorrect bounds elimination, and V8 sandbox bypass to achieve renderer RCE and sandbox escape in Chrome/Chromium.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

format-string-exploitation

Format string exploitation playbook. Use when printf-family functions receive user-controlled format strings, enabling arbitrary stack reads (%p/%s), arbitrary memory writes (%n/%hn/%hhn), GOT/hook overwrites, and canary/libc/PIE leaks.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

defi-attack-patterns

DeFi attack pattern playbook. Use when analyzing flash loan attacks, price oracle manipulation, MEV sandwich attacks, governance exploits, bridge vulnerabilities, and token standard edge cases in decentralized finance protocols.

🇺🇸|EnglishTranslated
4
1...7273747576...137
Page