Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,930 skills, Security & Compliance has 1637 skills

Categories

Showing 12 of 1637 skills

Per page
Downloads
Sort
Security & Complianceyaklang/hack-skills

windows-av-evasion

AV/EDR evasion playbook for Windows. Use when bypassing AMSI, ETW, .NET assembly detection, shellcode execution, process injection, API hooking, and signature-based detection on Windows endpoints.

🇺🇸|EnglishTranslated
4
Security & Compliancemembranedev/application-s...

faraday

Faraday integration. Manage Organizations. Use when the user wants to interact with Faraday data.

🇺🇸|EnglishTranslated
4
Security & Compliancevtexdocs/ai-skills

vtex-io-auth-and-policies

Apply when deciding or implementing permissions and authorization boundaries for VTEX IO apps. Covers manifest policies, outbound-access rules, least-privilege design, and how service routes or integrations map to explicit permissions. Use for deciding who is authorized to call or consume a capability, adding new integrations, exposing protected routes, or reviewing app permissions for overreach or missing access.

🇺🇸|EnglishTranslated
4
Security & Complianceyaklang/hack-skills

reverse-shell-techniques

Reverse shell techniques playbook. Use when establishing remote shells including language one-liners, encrypted shells (OpenSSL/socat/ncat), web shells, PTY upgrades, file transfer methods, PowerShell shells, and Windows payload generation.

🇺🇸|EnglishTranslated
4
Security & Compliancemarkdown-viewer/skills

security

Create security architecture diagrams using PlantUML syntax with identity, encryption, firewall, and compliance stencil icons. Best for IAM flows, zero-trust architectures, encryption pipelines, compliance auditing, and threat detection. NOT for general cloud infra (use cloud skill) or simple flowcharts (use mermaid).

🇺🇸|EnglishTranslated
4
Security & Compliancedanielmiessler/personal_a...

investigation

OSINT and investigation including people search, company intel, domain lookup, social media discovery, and threat intel. USE WHEN OSINT, due diligence, company intel, background check, find person, people search, domain lookup, entity lookup, threat intel, who is.

🇺🇸|EnglishTranslated
4
Security & Compliancearadotso/trending-skills

bluehammer-vulnerability-poc

Skill for working with the BlueHammer vulnerability proof-of-concept repository, covering build, usage, and code patterns.

🇺🇸|EnglishTranslated
4
Security & Compliancep4nda0s/reverse-skills

rev-unicorn-debug

Debug and emulate specific code fragments or functions using the Unicorn engine. Activate when the user wants to emulate a function with Unicorn, trace binary execution without running the full program, decrypt or decode data by emulating the algorithm, or bypass environment dependencies (JNI, syscalls, libc) during emulation.

🇺🇸|EnglishTranslated
4
Security & Compliancep4nda0s/reverse-skills

rev-symbol

Restore function symbols by analyzing code patterns, strings, constants, and cross-references

🇺🇸|EnglishTranslated
4
Security & Compliancealinaqi/claude-bootstrap

cpg-analysis

Deep code property graph analysis with Joern CPG (AST+CFG+PDG) and CodeQL for control flow, data flow, taint analysis, and security auditing

🇺🇸|EnglishTranslated
4
Security & Compliancepproenca/dot-skills

threat-patch

Use this skill to remediate security findings by producing minimal, surgical code patches. Triggers on 'patch security findings', 'fix vulnerabilities', 'remediate findings', 'threat patch', or when the user provides a findings.json (from threat-model), a Codex security findings CSV, a THREAT-MODEL.md, or individual vulnerability descriptions and wants them fixed. Also trigger when reviewing code flagged by a security scanner and the user wants actionable fixes rather than just reports.

🇺🇸|EnglishTranslated
4
1 scripts/Attention
Security & Compliancepproenca/dot-skills

threat-model

Use this skill whenever performing security threat modeling, attack surface mapping, or trust boundary analysis on a codebase. Triggers on 'threat model', 'security review', 'attack surface', 'trust boundaries', or when assessing a project's security posture. Also trigger when the user is about to build security-sensitive features (auth, crypto, file I/O, network services, native bridges) and needs to understand the threat landscape first — even if they don't explicitly say "threat model." Also triggers on 'what changed' or 'diff analysis' for incremental security review of recent commits.

🇺🇸|EnglishTranslated
4
2 scripts/Attention
1...7374757677...137
Page